aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--tests/wpt/metadata/FileAPI/url/url-with-fetch.any.js.ini3
-rw-r--r--tests/wpt/metadata/MANIFEST.json20078
-rw-r--r--tests/wpt/metadata/css/compositing/mix-blend-mode/mix-blend-mode-animation.html.ini2
-rw-r--r--tests/wpt/metadata/css/css-flexbox/flex-wrap-006.html.ini2
-rw-r--r--tests/wpt/metadata/css/cssom-view/matchMedia-display-none-iframe.html.ini2
-rw-r--r--tests/wpt/metadata/dom/idlharness.window.js.ini300
-rw-r--r--tests/wpt/metadata/fetch/content-type/response.window.js.ini20
-rw-r--r--tests/wpt/metadata/fetch/content-type/script.window.js.ini5
-rw-r--r--tests/wpt/metadata/fetch/nosniff/parsing-nosniff.window.js.ini3
-rw-r--r--tests/wpt/metadata/fetch/sec-metadata/redirect/redirect-https-downgrade.tentative.sub.html.ini4
-rw-r--r--tests/wpt/metadata/html/browsers/history/the-history-interface/traverse_the_history_1.html.ini4
-rw-r--r--tests/wpt/metadata/html/browsers/history/the-history-interface/traverse_the_history_3.html.ini4
-rw-r--r--tests/wpt/metadata/html/browsers/history/the-history-interface/traverse_the_history_4.html.ini4
-rw-r--r--tests/wpt/metadata/html/browsers/the-window-object/apis-for-creating-and-navigating-browsing-contexts-by-name/creating_browsing_context_test_01.html.ini4
-rw-r--r--tests/wpt/metadata/html/semantics/embedded-content/media-elements/media_fragment_seek.html.ini4
-rw-r--r--tests/wpt/metadata/html/semantics/forms/autofocus/autofocus-on-stable-document.html.ini4
-rw-r--r--tests/wpt/metadata/html/semantics/forms/autofocus/first-reconnected.html.ini4
-rw-r--r--tests/wpt/metadata/html/semantics/forms/autofocus/first-when-later-but-before.html.ini3
-rw-r--r--tests/wpt/metadata/html/semantics/forms/autofocus/first-when-later.html.ini3
-rw-r--r--tests/wpt/metadata/html/semantics/forms/autofocus/first.html.ini3
-rw-r--r--tests/wpt/metadata/html/semantics/forms/autofocus/focusable-area-in-top-document.html.ini4
-rw-r--r--tests/wpt/metadata/html/semantics/forms/autofocus/queue-non-focusable.html.ini4
-rw-r--r--tests/wpt/metadata/html/semantics/forms/autofocus/skip-document-with-fragment.html.ini4
-rw-r--r--tests/wpt/metadata/html/semantics/forms/autofocus/skip-non-focusable.html.ini4
-rw-r--r--tests/wpt/metadata/html/semantics/forms/autofocus/spin-by-blocking-style-sheet.html.ini5
-rw-r--r--tests/wpt/metadata/html/semantics/forms/autofocus/update-the-rendering.html.ini5
-rw-r--r--tests/wpt/metadata/html/semantics/forms/constraints/form-validation-validity-rangeOverflow.html.ini3
-rw-r--r--tests/wpt/metadata/html/semantics/forms/constraints/form-validation-validity-rangeUnderflow.html.ini3
-rw-r--r--tests/wpt/metadata/html/semantics/forms/constraints/form-validation-validity-stepMismatch.html.ini6
-rw-r--r--tests/wpt/metadata/html/semantics/forms/form-submission-0/form-submission-algorithm.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-http.keep-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-http.no-redirect.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-http.swap-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-https.keep-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-https.no-redirect.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-https.swap-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-http.keep-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-http.no-redirect.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-http.swap-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-https.keep-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-https.no-redirect.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-https.swap-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-http.swap-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-https.keep-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-https.no-redirect.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-https.swap-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-http.keep-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-http.no-redirect.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-http.swap-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-https.keep-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-https.no-redirect.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-https.swap-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-http.keep-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-http.no-redirect.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-http.swap-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-https.keep-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-https.no-redirect.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-https.swap-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-http.keep-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-http.no-redirect.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-http.swap-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-https.keep-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-https.no-redirect.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-https.swap-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-http.keep-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-http.no-redirect.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-http.swap-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-https.swap-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-http.swap-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-https.keep-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-https.no-redirect.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-https.swap-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-http.keep-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-http.no-redirect.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-http.swap-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-https.keep-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-https.no-redirect.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-https.swap-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-http.keep-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-http.no-redirect.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-http.swap-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-https.keep-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-https.no-redirect.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-https.swap-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-http.keep-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-http.no-redirect.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-http.swap-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-https.keep-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-https.no-redirect.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-https.swap-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/same-http.keep-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/same-http.no-redirect.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/same-http.swap-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/same-https.keep-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/same-https.no-redirect.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/same-https.swap-origin.http.html.ini5
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-https.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-https.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-https.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-http.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-https.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-https.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-https.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer/sharedworker-classic/same-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer/sharedworker-classic/same-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-https.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-https.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-https.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-https.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-https.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-https.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/fetch/cross-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/fetch/cross-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/fetch/cross-http.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/fetch/cross-https.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/fetch/cross-https.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/fetch/cross-https.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/fetch/same-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/fetch/same-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/fetch/same-http.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/fetch/same-https.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/fetch/same-https.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/fetch/same-https.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/img-tag/cross-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/img-tag/cross-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/img-tag/cross-http.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/img-tag/cross-https.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/img-tag/cross-https.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/img-tag/cross-https.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/img-tag/same-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/img-tag/same-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/img-tag/same-http.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/img-tag/same-https.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/img-tag/same-https.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/img-tag/same-https.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/sharedworker-classic/same-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/sharedworker-classic/same-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/worker-classic/same-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/worker-classic/same-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/worker-module/same-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/worker-module/same-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/fetch/same-http.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/fetch/same-http.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-https.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-https.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-https.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/img-tag/same-http.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/img-tag/same-http.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/img-tag/same-http.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/img-tag/same-https.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/script-tag/same-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/script-tag/same-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/worker-module/same-http.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/worker-module/same-http.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/xhr/same-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/xhr/same-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-https.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-https.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-https.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-http.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-https.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-https.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-https.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-http.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-https.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-https.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-https.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-http.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-https.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-https.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-https.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-http.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-https.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-https.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-https.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/sharedworker-classic/same-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/sharedworker-classic/same-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/worker-classic/same-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/worker-classic/same-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/worker-module/same-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/worker-module/same-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/fetch/cross-http.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/fetch/cross-http.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/fetch/cross-http.swap-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/fetch/cross-https.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/fetch/cross-https.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/fetch/cross-https.swap-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/fetch/same-http.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/fetch/same-http.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/fetch/same-http.swap-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/fetch/same-https.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/fetch/same-https.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/fetch/same-https.swap-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/iframe-tag/cross-http.keep-origin.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/iframe-tag/cross-http.no-redirect.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/iframe-tag/cross-http.swap-origin.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/iframe-tag/cross-https.keep-origin.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/iframe-tag/cross-https.no-redirect.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/iframe-tag/cross-https.swap-origin.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/iframe-tag/same-http.keep-origin.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/iframe-tag/same-http.no-redirect.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/iframe-tag/same-http.swap-origin.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/iframe-tag/same-https.keep-origin.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/iframe-tag/same-https.no-redirect.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/iframe-tag/same-https.swap-origin.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/img-tag/cross-http.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/img-tag/cross-http.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/img-tag/cross-http.swap-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/img-tag/cross-https.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/img-tag/cross-https.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/img-tag/cross-https.swap-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/img-tag/same-http.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/img-tag/same-http.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/img-tag/same-http.swap-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/img-tag/same-https.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/img-tag/same-https.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/img-tag/same-https.swap-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/script-tag/cross-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/script-tag/cross-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/script-tag/cross-http.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/script-tag/cross-https.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/script-tag/cross-https.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/script-tag/cross-https.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/script-tag/same-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/script-tag/same-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/script-tag/same-http.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/script-tag/same-https.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/script-tag/same-https.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/script-tag/same-https.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/sharedworker-classic/same-http.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/sharedworker-classic/same-http.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/worker-classic/same-http.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/worker-classic/same-http.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/worker-module/same-http.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/worker-module/same-http.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/xhr/cross-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/xhr/cross-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/xhr/cross-http.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/xhr/cross-https.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/xhr/cross-https.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/xhr/cross-https.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/xhr/same-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/xhr/same-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/xhr/same-http.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/xhr/same-https.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/xhr/same-https.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/xhr/same-https.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer/sharedworker-classic/same-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer/sharedworker-classic/same-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/same-http.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/same-http.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/same-http.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/same-https.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/same-https.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/same-https.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/same-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/same-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/origin/fetch/cross-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/origin/fetch/cross-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/origin/fetch/cross-http.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/origin/fetch/cross-https.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/origin/fetch/cross-https.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/origin/fetch/cross-https.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/origin/fetch/same-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/origin/fetch/same-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/origin/fetch/same-http.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/origin/fetch/same-https.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/origin/fetch/same-https.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/origin/fetch/same-https.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/origin/sharedworker-classic/same-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/origin/sharedworker-classic/same-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/origin/worker-classic/same-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/origin/worker-classic/same-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/origin/worker-module/same-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/origin/worker-module/same-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/same-origin/fetch/same-http.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/same-origin/fetch/same-http.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/same-origin/iframe-tag/same-http.keep-origin.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/same-origin/iframe-tag/same-http.no-redirect.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/same-origin/script-tag/same-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/same-origin/script-tag/same-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/same-origin/sharedworker-classic/same-http.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/same-origin/sharedworker-classic/same-http.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/same-origin/worker-classic/same-http.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/same-origin/worker-classic/same-http.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/same-origin/worker-module/same-http.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/same-origin/worker-module/same-http.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/same-origin/xhr/same-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/same-origin/xhr/same-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/fetch/cross-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/fetch/cross-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/fetch/cross-http.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/fetch/cross-https.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/fetch/cross-https.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/fetch/cross-https.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/fetch/same-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/fetch/same-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/fetch/same-http.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/fetch/same-https.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/fetch/same-https.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/fetch/same-https.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/sharedworker-classic/same-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/sharedworker-classic/same-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/worker-classic/same-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/worker-classic/same-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/worker-module/same-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/worker-module/same-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/fetch/cross-http.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/fetch/cross-http.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/fetch/cross-http.swap-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/fetch/cross-https.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/fetch/cross-https.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/fetch/cross-https.swap-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/fetch/same-http.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/fetch/same-http.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/fetch/same-http.swap-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/fetch/same-https.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/fetch/same-https.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/fetch/same-https.swap-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/cross-http.keep-origin.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/cross-http.no-redirect.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/cross-http.swap-origin.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/cross-https.keep-origin.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/cross-https.no-redirect.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/cross-https.swap-origin.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/same-http.keep-origin.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/same-http.no-redirect.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/same-http.swap-origin.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/same-https.keep-origin.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/same-https.no-redirect.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/same-https.swap-origin.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/script-tag/cross-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/script-tag/cross-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/script-tag/cross-http.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/script-tag/cross-https.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/script-tag/cross-https.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/script-tag/cross-https.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/script-tag/same-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/script-tag/same-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/script-tag/same-http.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/script-tag/same-https.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/script-tag/same-https.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/script-tag/same-https.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/worker-classic/same-http.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/worker-classic/same-http.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/worker-module/same-http.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/worker-module/same-http.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/xhr/cross-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/xhr/cross-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/xhr/cross-http.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/xhr/cross-https.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/xhr/cross-https.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/xhr/cross-https.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/xhr/same-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/xhr/same-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/xhr/same-http.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/xhr/same-https.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/xhr/same-https.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/xhr/same-https.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unset/fetch/cross-http.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unset/fetch/cross-http.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unset/fetch/cross-http.swap-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unset/fetch/cross-https.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unset/fetch/cross-https.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unset/fetch/cross-https.swap-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unset/fetch/same-http.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unset/fetch/same-http.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unset/fetch/same-http.swap-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unset/fetch/same-https.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unset/fetch/same-https.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unset/fetch/same-https.swap-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unset/iframe-tag/cross-http.keep-origin.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unset/iframe-tag/cross-http.no-redirect.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unset/iframe-tag/cross-http.swap-origin.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unset/iframe-tag/cross-https.keep-origin.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unset/iframe-tag/cross-https.no-redirect.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unset/iframe-tag/cross-https.swap-origin.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unset/iframe-tag/same-http.keep-origin.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unset/iframe-tag/same-http.no-redirect.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unset/iframe-tag/same-http.swap-origin.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unset/iframe-tag/same-https.keep-origin.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unset/iframe-tag/same-https.no-redirect.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unset/iframe-tag/same-https.swap-origin.http.html.ini2
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unset/script-tag/cross-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unset/script-tag/cross-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unset/script-tag/cross-http.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unset/script-tag/cross-https.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unset/script-tag/cross-https.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unset/script-tag/cross-https.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unset/script-tag/same-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unset/script-tag/same-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unset/script-tag/same-http.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unset/script-tag/same-https.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unset/script-tag/same-https.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unset/script-tag/same-https.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unset/sharedworker-classic/same-http.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unset/sharedworker-classic/same-http.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unset/worker-classic/same-http.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unset/worker-classic/same-http.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unset/worker-module/same-http.keep-origin.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unset/worker-module/same-http.no-redirect.http.html.ini13
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unset/xhr/cross-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unset/xhr/cross-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unset/xhr/cross-http.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unset/xhr/cross-https.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unset/xhr/cross-https.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unset/xhr/cross-https.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unset/xhr/same-http.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unset/xhr/same-http.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unset/xhr/same-http.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unset/xhr/same-https.keep-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unset/xhr/same-https.no-redirect.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/gen/top.meta/unset/xhr/same-https.swap-origin.http.html.ini4
-rw-r--r--tests/wpt/metadata/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/img-tag/no-redirect/generic.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/img-tag/no-redirect/generic.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/no-referrer/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/no-referrer/attr-referrer/same-origin/http-http/img-tag/no-redirect/generic.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/no-referrer/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/no-referrer/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/no-referrer/attr-referrer/same-origin/http-https/img-tag/no-redirect/generic.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/no-referrer/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/cross-origin.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/no-redirect/cross-origin.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/cross-origin.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/cross-origin.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/no-redirect/cross-origin.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/cross-origin.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/same-origin-insecure.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/no-redirect/same-origin-insecure.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/same-origin-insecure.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-upgrade.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/no-redirect/same-origin-upgrade.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/origin/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/origin/attr-referrer/cross-origin/http-http/img-tag/no-redirect/generic.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/origin/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/origin/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/origin/attr-referrer/cross-origin/http-https/img-tag/no-redirect/generic.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/origin/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/origin/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/origin/attr-referrer/same-origin/http-http/img-tag/no-redirect/generic.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/origin/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/origin/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/origin/attr-referrer/same-origin/http-https/img-tag/no-redirect/generic.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/same-origin/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/cross-origin.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/same-origin/attr-referrer/cross-origin/http-http/img-tag/no-redirect/cross-origin.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/same-origin/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/cross-origin.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/same-origin/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/cross-origin.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/same-origin/attr-referrer/cross-origin/http-https/img-tag/no-redirect/cross-origin.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/same-origin/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/cross-origin.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/same-origin/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/same-origin-insecure.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/same-origin/attr-referrer/same-origin/http-http/img-tag/no-redirect/same-origin-insecure.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/same-origin/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/same-origin-insecure.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/same-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/cross-insecure.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/no-redirect/cross-insecure.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/cross-insecure.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/same-insecure.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/no-redirect/same-insecure.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/same-insecure.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/strict-origin/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/strict-origin/attr-referrer/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/strict-origin/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/strict-origin/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/strict-origin/attr-referrer/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/strict-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/img-tag/no-redirect/generic.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/img-tag/no-redirect/generic.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/img-tag/no-redirect/generic.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/img-tag/no-redirect/generic.http.html.ini1
-rw-r--r--tests/wpt/metadata/referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html.ini1
-rw-r--r--tests/wpt/metadata/webaudio/the-audio-api/the-audiobuffersourcenode-interface/sub-sample-buffer-stitching.html.ini6
-rw-r--r--tests/wpt/metadata/webxr/xrSession_viewer_availability.https.html.ini3
-rw-r--r--tests/wpt/mozilla/meta/css/transition_calc_implicit.html.ini2
-rw-r--r--tests/wpt/web-platform-tests/IndexedDB/idbobjectstore_createIndex15-autoincrement.htm54
-rw-r--r--tests/wpt/web-platform-tests/IndexedDB/transaction-relaxed-durability.tentative.any.js39
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/adapter/adapter-absent-getAvailability.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/adapter/adapter-added-getAvailability.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/adapter/adapter-powered-off-getAvailability.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/adapter/adapter-powered-on-getAvailability.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/adapter/adapter-powered-on-off-on-getAvailability.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/adapter/adapter-removed-getAvailability.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/adapter/cross-origin-iframe-getAvailability.sub.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/characteristic/characteristicProperties.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/characteristic/getDescriptor/gen-characteristic-is-removed.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/characteristic/getDescriptor/gen-descriptor-get-same-object.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/characteristic/getDescriptor/gen-service-is-removed.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/characteristic/getDescriptors/gen-characteristic-is-removed-with-uuid.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/characteristic/getDescriptors/gen-characteristic-is-removed.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/characteristic/getDescriptors/gen-descriptor-get-same-object.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/characteristic/getDescriptors/gen-service-is-removed-with-uuid.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/characteristic/getDescriptors/gen-service-is-removed.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/characteristic/notifications/characteristic-is-removed.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/characteristic/notifications/service-is-removed.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/characteristic/readValue/add-multiple-event-listeners.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/characteristic/readValue/characteristic-is-removed.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/characteristic/readValue/event-is-fired.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/characteristic/readValue/gen-characteristic-is-removed.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/characteristic/readValue/read-succeeds.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/characteristic/readValue/read-updates-value.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/characteristic/readValue/service-is-removed.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/characteristic/service-same-from-2-characteristics.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/characteristic/service-same-object.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/characteristic/startNotifications/gen-characteristic-is-removed.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/characteristic/writeValue/buffer-is-detached.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/characteristic/writeValue/characteristic-is-removed.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/characteristic/writeValue/gen-characteristic-is-removed.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/characteristic/writeValue/service-is-removed.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/characteristic/writeValue/write-succeeds.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/descriptor/readValue/gen-service-is-removed.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/descriptor/readValue/read-succeeds.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/descriptor/writeValue/buffer-is-detached.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/descriptor/writeValue/gen-service-is-removed.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/device/gattserverdisconnected-event/disconnected.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/device/gattserverdisconnected-event/disconnected_gc.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/device/gattserverdisconnected-event/one-event-per-disconnection.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/device/gattserverdisconnected-event/reconnect-during-disconnected-event.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/script-tests/base_test_js.template2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-disconnect-called-before.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-disconnect-called-during-error.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-disconnect-called-during-success.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-disconnect-invalidates-objects.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-disconnected-device.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-discovery-complete-no-permission-absent-service.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-discovery-complete-service-not-found.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-garbage-collection-ran-during-error.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-garbage-collection-ran-during-success.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-get-different-service-after-reconnection.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-get-same-object.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-invalid-service-name.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-no-permission-absent-service.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-no-permission-for-any-service.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-no-permission-present-service.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-service-not-found.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-disconnect-called-before-with-uuid.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-disconnect-called-before.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-disconnect-called-during-error-with-uuid.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-disconnect-called-during-error.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-disconnect-called-during-success-with-uuid.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-disconnect-called-during-success.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-disconnect-invalidates-objects-with-uuid.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-disconnect-invalidates-objects.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-disconnected-device-with-uuid.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-disconnected-device.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-discovery-complete-no-permission-absent-service-with-uuid.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-discovery-complete-service-not-found-with-uuid.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-garbage-collection-ran-during-error-with-uuid.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-garbage-collection-ran-during-error.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-garbage-collection-ran-during-success-with-uuid.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-garbage-collection-ran-during-success.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-get-different-service-after-reconnection-with-uuid.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-get-different-service-after-reconnection.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-get-same-object-with-uuid.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-get-same-object.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-invalid-service-name.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-no-permission-absent-service-with-uuid.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-no-permission-for-any-service-with-uuid.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-no-permission-for-any-service.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-no-permission-present-service-with-uuid.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-service-not-found-with-uuid.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/service/getCharacteristic/gen-blocklisted-characteristic.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/service/getCharacteristic/gen-characteristic-not-found.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/service/getCharacteristic/gen-garbage-collection-ran-during-error.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/service/getCharacteristic/gen-get-same-object.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/service/getCharacteristic/gen-invalid-characteristic-name.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/service/getCharacteristic/gen-reconnect-during.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/service/getCharacteristic/gen-service-is-removed.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/service/getCharacteristics/gen-blocklisted-characteristic-with-uuid.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/service/getCharacteristics/gen-characteristic-not-found-with-uuid.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/service/getCharacteristics/gen-garbage-collection-ran-during-error-with-uuid.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/service/getCharacteristics/gen-garbage-collection-ran-during-error.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/service/getCharacteristics/gen-get-same-object-with-uuid.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/service/getCharacteristics/gen-get-same-object.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/service/getCharacteristics/gen-invalid-characteristic-name.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/service/getCharacteristics/gen-reconnect-during-with-uuid.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/service/getCharacteristics/gen-reconnect-during.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/service/getCharacteristics/gen-service-is-removed-with-uuid.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/service/getCharacteristics/gen-service-is-removed.https.window.js2
-rw-r--r--tests/wpt/web-platform-tests/common/security-features/README.md93
-rw-r--r--tests/wpt/web-platform-tests/common/security-features/resources/common.js10
-rw-r--r--tests/wpt/web-platform-tests/common/security-features/tools/generate.py69
-rwxr-xr-xtests/wpt/web-platform-tests/common/security-features/tools/spec_validator.py95
-rw-r--r--tests/wpt/web-platform-tests/common/security-features/tools/util.py141
-rw-r--r--tests/wpt/web-platform-tests/css/css-contain/contain-size-replaced-004-ref.html4
-rw-r--r--tests/wpt/web-platform-tests/css/css-contain/contain-size-replaced-004.html4
-rw-r--r--tests/wpt/web-platform-tests/css/css-contain/contain-size-replaced-005-ref.html4
-rw-r--r--tests/wpt/web-platform-tests/css/css-contain/contain-size-replaced-005.html4
-rw-r--r--tests/wpt/web-platform-tests/css/css-contain/contain-size-replaced-006-ref.html7
-rw-r--r--tests/wpt/web-platform-tests/css/css-contain/contain-size-replaced-006.html4
-rw-r--r--tests/wpt/web-platform-tests/css/css-contain/support/60x60-green.pngbin0 -> 218 bytes
-rw-r--r--tests/wpt/web-platform-tests/css/css-contain/support/60x60-red.pngbin0 -> 217 bytes
-rw-r--r--tests/wpt/web-platform-tests/css/css-flexbox/flex-wrap-006.html32
-rw-r--r--tests/wpt/web-platform-tests/css/css-position/position-absolute-dynamic-static-position-table-cell.html32
-rw-r--r--tests/wpt/web-platform-tests/css/css-sizing/block-fit-content-as-initial-ref.html6
-rw-r--r--tests/wpt/web-platform-tests/css/css-sizing/block-fit-content-as-initial.html18
-rw-r--r--tests/wpt/web-platform-tests/css/css-text/overflow-wrap/overflow-wrap-break-word-white-space-crash.html28
-rw-r--r--tests/wpt/web-platform-tests/css/css-values/calc-zero-percent-height.html30
-rw-r--r--tests/wpt/web-platform-tests/css/css-variables/vars-font-shorthand-001.html1
-rw-r--r--tests/wpt/web-platform-tests/css/css-writing-modes/available-size-003.html19
-rw-r--r--tests/wpt/web-platform-tests/css/css-writing-modes/available-size-005.html13
-rw-r--r--tests/wpt/web-platform-tests/css/css-writing-modes/available-size-009.html19
-rw-r--r--tests/wpt/web-platform-tests/css/css-writing-modes/available-size-013.html19
-rw-r--r--tests/wpt/web-platform-tests/css/css-writing-modes/available-size-014.html13
-rw-r--r--tests/wpt/web-platform-tests/css/css-writing-modes/available-size-016.html17
-rw-r--r--tests/wpt/web-platform-tests/docs/reviewing-tests/index.md6
-rw-r--r--tests/wpt/web-platform-tests/docs/test-suite-design.md7
-rw-r--r--tests/wpt/web-platform-tests/dom/idlharness.window.js5
-rw-r--r--tests/wpt/web-platform-tests/domxpath/README.md9
-rw-r--r--tests/wpt/web-platform-tests/domxpath/interfaces.tentative.html93
-rw-r--r--tests/wpt/web-platform-tests/feature-policy/experimental-features/intrinsicsize-with-unsized-media.tentative.https.sub.html122
-rw-r--r--tests/wpt/web-platform-tests/feature-policy/experimental-features/intrinsicsize-with-unsized-media.tentative.https.sub.html.headers1
-rw-r--r--tests/wpt/web-platform-tests/fetch/sec-metadata/redirect/multiple-redirect-https-downgrade-upgrade.tentative.sub.html7
-rw-r--r--tests/wpt/web-platform-tests/fetch/sec-metadata/redirect/redirect-http-upgrade.tentative.sub.html7
-rw-r--r--tests/wpt/web-platform-tests/fetch/sec-metadata/redirect/redirect-https-downgrade.tentative.sub.html2
-rw-r--r--tests/wpt/web-platform-tests/fetch/sec-metadata/resources/redirectTestHelper.sub.js8
-rw-r--r--tests/wpt/web-platform-tests/html/rendering/non-replaced-elements/form-controls/resets.html1
-rw-r--r--tests/wpt/web-platform-tests/html/semantics/embedded-content/svg/intrinsicsize/intrinsicsize-svg-image-ref.html22
-rw-r--r--tests/wpt/web-platform-tests/html/semantics/embedded-content/svg/intrinsicsize/intrinsicsize-svg-image.tentative.html24
-rw-r--r--tests/wpt/web-platform-tests/html/semantics/embedded-content/the-img-element/img.complete.html106
-rw-r--r--tests/wpt/web-platform-tests/html/semantics/embedded-content/the-img-element/intrinsicsize/intrinsicsize-with-responsive-images.tentative.html96
-rw-r--r--tests/wpt/web-platform-tests/html/semantics/embedded-content/the-img-element/intrinsicsize/intrinsicsize-without-unsized-media.tentative.https.sub.html66
-rw-r--r--tests/wpt/web-platform-tests/html/semantics/embedded-content/the-img-element/intrinsicsize/intrinsicsize-without-unsized-media.tentative.https.sub.html.headers1
-rw-r--r--tests/wpt/web-platform-tests/html/semantics/embedded-content/the-video-element/intrinsicsize/intrinsicsize-without-unsized-media.tentative.https.sub.html39
-rw-r--r--tests/wpt/web-platform-tests/html/semantics/embedded-content/the-video-element/intrinsicsize/intrinsicsize-without-unsized-media.tentative.https.sub.html.headers1
-rw-r--r--tests/wpt/web-platform-tests/html/semantics/forms/autofocus/autofocus-on-stable-document.html21
-rw-r--r--tests/wpt/web-platform-tests/html/semantics/forms/autofocus/first-reconnected.html22
-rw-r--r--tests/wpt/web-platform-tests/html/semantics/forms/autofocus/first-when-later-but-before.html21
-rw-r--r--tests/wpt/web-platform-tests/html/semantics/forms/autofocus/first-when-later.html21
-rw-r--r--tests/wpt/web-platform-tests/html/semantics/forms/autofocus/first.html10
-rw-r--r--tests/wpt/web-platform-tests/html/semantics/forms/autofocus/focusable-area-in-top-document.html24
-rw-r--r--tests/wpt/web-platform-tests/html/semantics/forms/autofocus/no-sandboxed-automatic-features.html17
-rw-r--r--tests/wpt/web-platform-tests/html/semantics/forms/autofocus/queue-non-focusable.html20
-rw-r--r--tests/wpt/web-platform-tests/html/semantics/forms/autofocus/resources/erase-first.css3
-rw-r--r--tests/wpt/web-platform-tests/html/semantics/forms/autofocus/resources/frame-with-autofocus-element.html5
-rw-r--r--tests/wpt/web-platform-tests/html/semantics/forms/autofocus/resources/moving-autofocus-to-parent.html10
-rw-r--r--tests/wpt/web-platform-tests/html/semantics/forms/autofocus/resources/utils.js21
-rw-r--r--tests/wpt/web-platform-tests/html/semantics/forms/autofocus/skip-another-top-level-browsing-context.html17
-rw-r--r--tests/wpt/web-platform-tests/html/semantics/forms/autofocus/skip-document-with-fragment.html32
-rw-r--r--tests/wpt/web-platform-tests/html/semantics/forms/autofocus/skip-non-focusable.html19
-rw-r--r--tests/wpt/web-platform-tests/html/semantics/forms/autofocus/skip-not-fully-active.html18
-rw-r--r--tests/wpt/web-platform-tests/html/semantics/forms/autofocus/spin-by-blocking-style-sheet.html17
-rw-r--r--tests/wpt/web-platform-tests/html/semantics/forms/autofocus/supported-elements.html6
-rw-r--r--tests/wpt/web-platform-tests/html/semantics/forms/autofocus/update-the-rendering.html41
-rw-r--r--tests/wpt/web-platform-tests/html/semantics/forms/constraints/form-validation-validity-rangeOverflow.html3
-rw-r--r--tests/wpt/web-platform-tests/html/semantics/forms/constraints/form-validation-validity-rangeUnderflow.html1
-rw-r--r--tests/wpt/web-platform-tests/html/semantics/forms/constraints/form-validation-validity-stepMismatch.html3
-rw-r--r--tests/wpt/web-platform-tests/interfaces/appmanifest.idl6
-rw-r--r--tests/wpt/web-platform-tests/interfaces/dom.idl48
-rw-r--r--tests/wpt/web-platform-tests/interfaces/entries-api.idl4
-rw-r--r--tests/wpt/web-platform-tests/interfaces/web-nfc.idl27
-rw-r--r--tests/wpt/web-platform-tests/mathml/relations/html5-tree/css-inline-style-dynamic.tentative-ref.html13
-rw-r--r--tests/wpt/web-platform-tests/mathml/relations/html5-tree/css-inline-style-dynamic.tentative.html37
-rw-r--r--tests/wpt/web-platform-tests/mixed-content/generic/mixed-content-test-case.js2
-rw-r--r--tests/wpt/web-platform-tests/mixed-content/generic/test-case.sub.js127
-rwxr-xr-xtests/wpt/web-platform-tests/mixed-content/generic/tools/generate.py33
-rw-r--r--tests/wpt/web-platform-tests/mixed-content/spec.src.json173
-rw-r--r--tests/wpt/web-platform-tests/mixed-content/spec_json.js2
-rw-r--r--tests/wpt/web-platform-tests/pointerevents/extension/pointerevent_coalesced_events_attributes-manual.html144
-rw-r--r--tests/wpt/web-platform-tests/pointerevents/extension/pointerevent_coalesced_events_attributes.html192
-rw-r--r--tests/wpt/web-platform-tests/pointerevents/extension/pointerevent_pointerrawupdate.html8
-rw-r--r--tests/wpt/web-platform-tests/pointerevents/pointerevent_pointercancel_touch.html16
-rw-r--r--tests/wpt/web-platform-tests/pointerevents/pointerevent_pointerleave_after_pointercancel_touch.html26
-rw-r--r--tests/wpt/web-platform-tests/pointerevents/pointerevent_pointerout_after_pointercancel_touch.html26
-rw-r--r--tests/wpt/web-platform-tests/pointerevents/pointerevent_releasepointercapture_events_to_original_target.html19
-rw-r--r--tests/wpt/web-platform-tests/pointerevents/pointerevent_releasepointercapture_onpointercancel_touch.html16
-rw-r--r--tests/wpt/web-platform-tests/pointerevents/pointerevent_sequence_at_implicit_release_on_click.html27
-rw-r--r--tests/wpt/web-platform-tests/pointerevents/pointerevent_setpointercapture_inactive_button_mouse.html12
-rw-r--r--tests/wpt/web-platform-tests/pointerevents/pointerevent_suppress_compat_events_on_click.html14
-rw-r--r--tests/wpt/web-platform-tests/pointerevents/pointerevent_suppress_compat_events_on_drag_mouse.html14
-rw-r--r--tests/wpt/web-platform-tests/pointerevents/pointerevent_touch-action-inherit_child-pan-x-child-pan-y_touch.html14
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-http.keep-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-http.no-redirect.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-http.swap-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-https.keep-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-https.no-redirect.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-https.swap-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-http.keep-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-http.no-redirect.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-http.swap-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-https.keep-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-https.no-redirect.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-https.swap-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-http.swap-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-https.keep-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-https.no-redirect.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-https.swap-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-http.keep-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-http.no-redirect.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-http.swap-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-https.keep-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-https.no-redirect.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-https.swap-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-http.keep-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-http.no-redirect.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-http.swap-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-https.keep-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-https.no-redirect.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-https.swap-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-http.keep-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-http.no-redirect.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-http.swap-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-https.keep-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-https.no-redirect.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-https.swap-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-http.keep-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-http.no-redirect.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-http.swap-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-https.swap-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-http.swap-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-https.keep-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-https.no-redirect.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-https.swap-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-http.keep-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-http.no-redirect.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-http.swap-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-https.keep-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-https.no-redirect.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-https.swap-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-http.keep-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-http.no-redirect.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-http.swap-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-https.keep-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-https.no-redirect.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-https.swap-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-http.keep-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-http.no-redirect.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-http.swap-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-https.keep-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-https.no-redirect.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-https.swap-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/same-http.keep-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/same-http.no-redirect.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/same-http.swap-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/same-https.keep-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/same-https.no-redirect.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/same-https.swap-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/same-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/same-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/same-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/same-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/same-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/same-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/same-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/same-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/sharedworker-classic/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/sharedworker-classic/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/sharedworker-classic/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/sharedworker-classic/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/worker-classic/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/worker-classic/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/worker-classic/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/worker-classic/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/worker-module/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/worker-module/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/worker-module/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/worker-module/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/same-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/same-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/same-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/same-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/same-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/same-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/same-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/same-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/cross-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/cross-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/cross-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/cross-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/cross-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/cross-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/cross-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/cross-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/cross-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/cross-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/cross-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/cross-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/same-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/same-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/same-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/same-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/same-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/same-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/same-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/same-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/same-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/same-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/same-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/same-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/same-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/same-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/same-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/same-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/cross-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/cross-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/cross-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/cross-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/cross-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/cross-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/cross-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/cross-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/cross-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/cross-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/cross-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/cross-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/same-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/same-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/same-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/same-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/same-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/same-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/same-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/same-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/cross-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/cross-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/cross-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/cross-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/cross-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/cross-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/cross-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/cross-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/cross-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/cross-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/cross-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/cross-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/same-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/same-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/same-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/same-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/same-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/same-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/same-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/same-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/sharedworker-classic/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/sharedworker-classic/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/sharedworker-classic/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/sharedworker-classic/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/worker-classic/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/worker-classic/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/worker-classic/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/worker-classic/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/worker-module/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/worker-module/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/worker-module/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/worker-module/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/cross-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/cross-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/cross-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/cross-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/cross-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/cross-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/cross-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/cross-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/cross-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/cross-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/cross-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/cross-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/same-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/same-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/same-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/same-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/same-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/same-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/same-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/same-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/cross-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/cross-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/cross-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/cross-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/cross-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/cross-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/cross-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/cross-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/cross-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/cross-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/cross-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/cross-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/same-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/same-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/same-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/same-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/same-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/same-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/same-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/same-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/same-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/same-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/same-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/same-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/same-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/same-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/same-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/same-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/worker-module/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/worker-module/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/worker-module/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/worker-module/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/cross-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/cross-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/cross-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/cross-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/cross-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/cross-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/cross-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/cross-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/cross-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/cross-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/cross-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/cross-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/same-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/same-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/same-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/same-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/sharedworker-classic/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/sharedworker-classic/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/sharedworker-classic/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/sharedworker-classic/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/worker-classic/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/worker-classic/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/worker-classic/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/worker-classic/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/worker-module/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/worker-module/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/worker-module/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/worker-module/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/same-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/same-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/same-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/same-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/same-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/same-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/same-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/same-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/fetch/cross-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/fetch/cross-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/fetch/cross-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/fetch/cross-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/fetch/cross-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/fetch/cross-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/fetch/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/fetch/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/fetch/same-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/fetch/same-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/fetch/same-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/fetch/same-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/iframe-tag/cross-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/iframe-tag/cross-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/iframe-tag/cross-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/iframe-tag/cross-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/iframe-tag/cross-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/iframe-tag/cross-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/iframe-tag/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/iframe-tag/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/iframe-tag/same-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/iframe-tag/same-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/iframe-tag/same-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/iframe-tag/same-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/img-tag/cross-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/img-tag/cross-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/img-tag/cross-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/img-tag/cross-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/img-tag/cross-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/img-tag/cross-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/img-tag/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/img-tag/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/img-tag/same-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/img-tag/same-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/img-tag/same-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/img-tag/same-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/script-tag/cross-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/script-tag/cross-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/script-tag/cross-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/script-tag/cross-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/script-tag/cross-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/script-tag/cross-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/script-tag/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/script-tag/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/script-tag/same-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/script-tag/same-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/script-tag/same-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/script-tag/same-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/sharedworker-classic/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/sharedworker-classic/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/worker-classic/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/worker-classic/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/worker-module/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/worker-module/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/xhr/cross-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/xhr/cross-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/xhr/cross-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/xhr/cross-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/xhr/cross-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/xhr/cross-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/xhr/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/xhr/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/xhr/same-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/xhr/same-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/xhr/same-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/xhr/same-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/fetch/cross-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/fetch/cross-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/fetch/cross-http.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/fetch/cross-https.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/fetch/cross-https.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/fetch/cross-https.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/fetch/same-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/fetch/same-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/fetch/same-http.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/fetch/same-https.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/fetch/same-https.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/fetch/same-https.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/iframe-tag/cross-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/iframe-tag/cross-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/iframe-tag/cross-http.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/iframe-tag/cross-https.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/iframe-tag/cross-https.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/iframe-tag/cross-https.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/iframe-tag/same-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/iframe-tag/same-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/iframe-tag/same-http.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/iframe-tag/same-https.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/iframe-tag/same-https.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/iframe-tag/same-https.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/script-tag/cross-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/script-tag/cross-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/script-tag/cross-http.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/script-tag/cross-https.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/script-tag/cross-https.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/script-tag/cross-https.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/script-tag/same-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/script-tag/same-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/script-tag/same-http.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/script-tag/same-https.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/script-tag/same-https.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/script-tag/same-https.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/sharedworker-classic/same-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/sharedworker-classic/same-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/worker-classic/same-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/worker-classic/same-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/worker-module/same-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/worker-module/same-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/xhr/cross-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/xhr/cross-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/xhr/cross-http.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/xhr/cross-https.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/xhr/cross-https.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/xhr/cross-https.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/xhr/same-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/xhr/same-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/xhr/same-http.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/xhr/same-https.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/xhr/same-https.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/xhr/same-https.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/same-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/same-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/same-http.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/same-https.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/same-https.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/same-https.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/same-http.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/same-https.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/same-https.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/same-https.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/cross-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/cross-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/cross-http.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/cross-https.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/cross-https.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/cross-https.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/same-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/same-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/same-http.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/same-https.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/same-https.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/same-https.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/fetch/cross-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/fetch/cross-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/fetch/cross-http.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/fetch/cross-https.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/fetch/cross-https.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/fetch/cross-https.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/fetch/same-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/fetch/same-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/fetch/same-http.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/fetch/same-https.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/fetch/same-https.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/fetch/same-https.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/iframe-tag/cross-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/iframe-tag/cross-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/iframe-tag/cross-http.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/iframe-tag/cross-https.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/iframe-tag/cross-https.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/iframe-tag/cross-https.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/iframe-tag/same-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/iframe-tag/same-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/iframe-tag/same-http.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/iframe-tag/same-https.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/iframe-tag/same-https.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/iframe-tag/same-https.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/script-tag/cross-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/script-tag/cross-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/script-tag/cross-http.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/script-tag/cross-https.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/script-tag/cross-https.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/script-tag/cross-https.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/script-tag/same-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/script-tag/same-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/script-tag/same-http.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/script-tag/same-https.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/script-tag/same-https.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/script-tag/same-https.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/sharedworker-classic/same-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/sharedworker-classic/same-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/worker-classic/same-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/worker-classic/same-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/worker-module/same-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/worker-module/same-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/xhr/cross-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/xhr/cross-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/xhr/cross-http.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/xhr/cross-https.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/xhr/cross-https.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/xhr/cross-https.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/xhr/same-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/xhr/same-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/xhr/same-http.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/xhr/same-https.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/xhr/same-https.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/xhr/same-https.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/fetch/cross-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/fetch/cross-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/fetch/cross-http.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/fetch/cross-https.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/fetch/cross-https.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/fetch/cross-https.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/fetch/same-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/fetch/same-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/fetch/same-http.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/fetch/same-https.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/iframe-tag/cross-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/iframe-tag/cross-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/iframe-tag/cross-http.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/iframe-tag/cross-https.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/iframe-tag/cross-https.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/iframe-tag/cross-https.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/iframe-tag/same-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/iframe-tag/same-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/iframe-tag/same-http.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/iframe-tag/same-https.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/script-tag/cross-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/script-tag/cross-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/script-tag/cross-http.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/script-tag/cross-https.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/script-tag/cross-https.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/script-tag/cross-https.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/script-tag/same-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/script-tag/same-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/script-tag/same-http.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/script-tag/same-https.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/sharedworker-classic/same-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/sharedworker-classic/same-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/worker-classic/same-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/worker-classic/same-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/worker-module/same-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/worker-module/same-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/xhr/cross-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/xhr/cross-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/xhr/cross-http.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/xhr/cross-https.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/xhr/cross-https.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/xhr/cross-https.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/xhr/same-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/xhr/same-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/xhr/same-http.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/xhr/same-https.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-https.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-https.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-https.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/cross-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/cross-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/cross-http.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/cross-https.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/cross-https.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/cross-https.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/same-https.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/same-https.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/same-https.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/fetch/cross-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/fetch/cross-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/fetch/cross-http.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/fetch/cross-https.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/fetch/cross-https.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/fetch/cross-https.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/fetch/same-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/fetch/same-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/fetch/same-http.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/fetch/same-https.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/fetch/same-https.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/fetch/same-https.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/iframe-tag/cross-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/iframe-tag/cross-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/iframe-tag/cross-http.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/iframe-tag/cross-https.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/iframe-tag/cross-https.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/iframe-tag/cross-https.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/iframe-tag/same-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/iframe-tag/same-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/iframe-tag/same-http.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/iframe-tag/same-https.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/iframe-tag/same-https.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/iframe-tag/same-https.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/script-tag/cross-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/script-tag/cross-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/script-tag/cross-http.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/script-tag/cross-https.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/script-tag/cross-https.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/script-tag/cross-https.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/script-tag/same-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/script-tag/same-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/script-tag/same-http.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/script-tag/same-https.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/script-tag/same-https.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/script-tag/same-https.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/sharedworker-classic/same-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/sharedworker-classic/same-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/worker-classic/same-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/worker-classic/same-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/worker-module/same-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/worker-module/same-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/xhr/cross-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/xhr/cross-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/xhr/cross-http.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/xhr/cross-https.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/xhr/cross-https.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/xhr/cross-https.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/xhr/same-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/xhr/same-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/xhr/same-http.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/xhr/same-https.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/xhr/same-https.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/xhr/same-https.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/fetch/cross-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/fetch/cross-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/fetch/cross-http.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/fetch/cross-https.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/fetch/cross-https.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/fetch/cross-https.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/fetch/same-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/fetch/same-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/fetch/same-http.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/fetch/same-https.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/fetch/same-https.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/fetch/same-https.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/cross-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/cross-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/cross-http.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/cross-https.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/cross-https.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/cross-https.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/same-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/same-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/same-http.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/same-https.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/same-https.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/same-https.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/script-tag/cross-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/script-tag/cross-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/script-tag/cross-http.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/script-tag/cross-https.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/script-tag/cross-https.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/script-tag/cross-https.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/script-tag/same-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/script-tag/same-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/script-tag/same-http.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/script-tag/same-https.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/script-tag/same-https.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/script-tag/same-https.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/worker-classic/same-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/worker-classic/same-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/worker-module/same-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/worker-module/same-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/xhr/cross-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/xhr/cross-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/xhr/cross-http.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/xhr/cross-https.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/xhr/cross-https.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/xhr/cross-https.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/xhr/same-http.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/xhr/same-http.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/xhr/same-http.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/xhr/same-https.keep-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/xhr/same-https.no-redirect.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/xhr/same-https.swap-origin.http.html35
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/fetch/cross-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/fetch/cross-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/fetch/cross-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/fetch/cross-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/fetch/cross-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/fetch/cross-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/fetch/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/fetch/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/fetch/same-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/fetch/same-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/fetch/same-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/fetch/same-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/iframe-tag/cross-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/iframe-tag/cross-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/iframe-tag/cross-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/iframe-tag/cross-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/iframe-tag/cross-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/iframe-tag/cross-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/iframe-tag/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/iframe-tag/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/iframe-tag/same-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/iframe-tag/same-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/iframe-tag/same-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/iframe-tag/same-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/script-tag/cross-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/script-tag/cross-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/script-tag/cross-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/script-tag/cross-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/script-tag/cross-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/script-tag/cross-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/script-tag/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/script-tag/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/script-tag/same-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/script-tag/same-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/script-tag/same-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/script-tag/same-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/sharedworker-classic/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/sharedworker-classic/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/worker-classic/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/worker-classic/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/worker-module/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/worker-module/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/xhr/cross-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/xhr/cross-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/xhr/cross-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/xhr/cross-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/xhr/cross-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/xhr/cross-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/xhr/same-http.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/xhr/same-http.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/xhr/same-http.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/xhr/same-https.keep-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/xhr/same-https.no-redirect.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/xhr/same-https.swap-origin.http.html34
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/generic/referrer-policy-test-case.sub.js159
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/generic/test-case.sub.js203
-rwxr-xr-xtests/wpt/web-platform-tests/referrer-policy/generic/tools/generate.py23
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/module-worker/no-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/module-worker/no-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/shared-worker/no-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/shared-worker/no-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/worker-request/no-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/worker-request/no-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/module-worker/keep-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/module-worker/no-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/shared-worker/keep-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/shared-worker/no-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/worker-request/keep-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/worker-request/no-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/fetch-request/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/fetch-request/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/img-tag/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/img-tag/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/script-tag/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/script-tag/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/xhr-request/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/xhr-request/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/fetch-request/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/fetch-request/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/img-tag/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/img-tag/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/script-tag/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/script-tag/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/xhr-request/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/xhr-request/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/fetch-request/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/fetch-request/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/iframe-tag/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/iframe-tag/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/img-tag/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/img-tag/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/module-worker/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/module-worker/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/script-tag/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/script-tag/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/shared-worker/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/shared-worker/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/worker-request/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/worker-request/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/xhr-request/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/xhr-request/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/fetch-request/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/fetch-request/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/iframe-tag/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/iframe-tag/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/img-tag/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/img-tag/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/script-tag/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/script-tag/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/xhr-request/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/xhr-request/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/fetch-request/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/script-tag/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/xhr-request/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/fetch-request/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/script-tag/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/xhr-request/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/fetch-request/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/iframe-tag/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/module-worker/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/module-worker/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/script-tag/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/shared-worker/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/shared-worker/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/worker-request/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/worker-request/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/xhr-request/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/fetch-request/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/script-tag/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/xhr-request/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/cross-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/no-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/no-redirect/cross-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/cross-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/no-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/no-redirect/cross-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/cross-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/no-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/no-redirect/cross-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/cross-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/cross-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/no-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/no-redirect/cross-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/cross-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/cross-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/no-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/no-redirect/cross-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/cross-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/cross-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/no-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/no-redirect/cross-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/cross-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/cross-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/no-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/no-redirect/cross-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/cross-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/cross-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/no-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/no-redirect/cross-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/cross-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/cross-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/no-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/no-redirect/cross-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/cross-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/cross-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/no-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/no-redirect/cross-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/cross-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/same-origin-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/no-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/no-redirect/same-origin-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/same-origin-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/same-origin-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/no-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/no-redirect/same-origin-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/same-origin-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/no-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/no-redirect/same-origin-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/same-origin-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/same-origin-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/module-worker/no-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/module-worker/no-redirect/same-origin-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/same-origin-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/no-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/no-redirect/same-origin-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/same-origin-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/same-origin-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/shared-worker/no-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/shared-worker/no-redirect/same-origin-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/same-origin-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/worker-request/no-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/worker-request/no-redirect/same-origin-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/same-origin-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/no-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/no-redirect/same-origin-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/same-origin-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-upgrade.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-upgrade.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/same-origin-upgrade.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/same-origin-upgrade.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-upgrade.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-upgrade.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/same-origin-upgrade.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/same-origin-upgrade.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-upgrade.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-upgrade.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/no-redirect/same-origin-upgrade.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/no-redirect/same-origin-upgrade.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-upgrade.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-upgrade.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/no-redirect/same-origin-upgrade.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/no-redirect/same-origin-upgrade.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-upgrade.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-upgrade.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/same-origin-upgrade.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/same-origin-upgrade.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/fetch-request/keep-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/fetch-request/no-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/fetch-request/swap-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/iframe-tag/no-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/script-tag/no-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/xhr-request/keep-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/xhr-request/no-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/xhr-request/swap-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/fetch-request/keep-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/fetch-request/no-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/fetch-request/swap-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/iframe-tag/no-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/script-tag/no-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/xhr-request/keep-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/xhr-request/no-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/xhr-request/swap-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/fetch-request/keep-origin-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/fetch-request/no-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/fetch-request/swap-origin-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/iframe-tag/no-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/module-worker/keep-origin-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/module-worker/no-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/script-tag/keep-origin-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/script-tag/no-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/script-tag/swap-origin-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/shared-worker/keep-origin-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/shared-worker/no-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/worker-request/keep-origin-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/worker-request/no-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/xhr-request/keep-origin-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/xhr-request/no-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/xhr-request/swap-origin-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-upgrade.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/no-redirect/same-origin-upgrade.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-upgrade.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/same-origin-upgrade.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-upgrade.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/no-redirect/same-origin-upgrade.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-upgrade.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/no-redirect/same-origin-upgrade.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/fetch-request/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/fetch-request/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/img-tag/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/img-tag/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/script-tag/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/script-tag/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/xhr-request/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/xhr-request/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/fetch-request/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/fetch-request/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/img-tag/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/img-tag/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/script-tag/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/script-tag/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/xhr-request/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/xhr-request/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/fetch-request/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/fetch-request/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/iframe-tag/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/iframe-tag/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/img-tag/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/img-tag/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/module-worker/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/module-worker/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/script-tag/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/script-tag/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/shared-worker/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/shared-worker/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/worker-request/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/worker-request/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/xhr-request/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/xhr-request/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/fetch-request/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/fetch-request/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/img-tag/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/img-tag/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/script-tag/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/script-tag/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/xhr-request/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/xhr-request/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/fetch-request/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/script-tag/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/xhr-request/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/fetch-request/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/script-tag/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/xhr-request/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/fetch-request/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/iframe-tag/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/module-worker/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/module-worker/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/script-tag/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/shared-worker/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/shared-worker/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/worker-request/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/worker-request/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/xhr-request/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-https/fetch-request/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-https/script-tag/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-https/xhr-request/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/cross-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/no-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/no-redirect/cross-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/cross-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/no-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/no-redirect/cross-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/cross-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/no-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/no-redirect/cross-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/cross-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/cross-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/no-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/no-redirect/cross-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/cross-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/cross-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/no-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/no-redirect/cross-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/cross-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/cross-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/no-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/no-redirect/cross-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/cross-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/cross-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/no-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/no-redirect/cross-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/cross-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/cross-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/no-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/no-redirect/cross-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/cross-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/cross-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/no-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/no-redirect/cross-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/cross-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/cross-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/no-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/no-redirect/cross-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/cross-origin.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/same-origin-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/no-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/no-redirect/same-origin-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/same-origin-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/same-origin-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/no-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/no-redirect/same-origin-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/same-origin-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/no-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/no-redirect/same-origin-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/same-origin-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/same-origin-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/module-worker/no-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/module-worker/no-redirect/same-origin-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/same-origin-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/no-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/no-redirect/same-origin-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/same-origin-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/same-origin-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/shared-worker/no-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/shared-worker/no-redirect/same-origin-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/same-origin-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/worker-request/no-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/worker-request/no-redirect/same-origin-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/same-origin-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/no-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/no-redirect/same-origin-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/same-origin-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/fetch-request/keep-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/fetch-request/no-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/fetch-request/swap-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/iframe-tag/no-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/script-tag/no-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/xhr-request/keep-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/xhr-request/no-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/xhr-request/swap-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/fetch-request/keep-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/fetch-request/no-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/fetch-request/swap-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/iframe-tag/no-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/script-tag/no-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/xhr-request/keep-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/xhr-request/no-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/xhr-request/swap-origin-redirect/cross-origin.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/fetch-request/keep-origin-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/fetch-request/no-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/fetch-request/swap-origin-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/iframe-tag/no-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/module-worker/keep-origin-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/module-worker/no-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/script-tag/keep-origin-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/script-tag/no-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/script-tag/swap-origin-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/shared-worker/keep-origin-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/shared-worker/no-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/worker-request/keep-origin-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/worker-request/no-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/xhr-request/keep-origin-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/xhr-request/no-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/xhr-request/swap-origin-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/spec.src.json300
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/spec_json.js2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/cross-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/cross-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/no-redirect/cross-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/no-redirect/cross-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/cross-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/cross-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/no-redirect/cross-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/no-redirect/cross-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/cross-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/cross-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/no-redirect/cross-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/no-redirect/cross-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/cross-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/cross-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/cross-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/cross-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/no-redirect/cross-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/no-redirect/cross-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/cross-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/cross-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/cross-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/cross-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/no-redirect/cross-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/no-redirect/cross-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/cross-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/cross-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/same-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/same-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/no-redirect/same-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/no-redirect/same-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/same-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/same-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/same-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/same-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/no-redirect/same-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/no-redirect/same-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/same-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/same-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/same-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/same-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/no-redirect/same-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/no-redirect/same-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/same-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/same-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/same-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/same-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/module-worker/no-redirect/same-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/module-worker/no-redirect/same-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/same-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/same-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/no-redirect/same-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/no-redirect/same-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/same-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/same-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/same-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/same-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/shared-worker/no-redirect/same-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/shared-worker/no-redirect/same-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/same-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/same-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/worker-request/no-redirect/same-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/worker-request/no-redirect/same-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/same-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/same-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/no-redirect/same-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/no-redirect/same-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/same-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/same-insecure.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/fetch-request/keep-origin-redirect/cross-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/fetch-request/no-redirect/cross-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/fetch-request/swap-origin-redirect/cross-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/iframe-tag/no-redirect/cross-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/cross-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/script-tag/no-redirect/cross-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/cross-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/xhr-request/keep-origin-redirect/cross-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/xhr-request/no-redirect/cross-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/xhr-request/swap-origin-redirect/cross-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/fetch-request/keep-origin-redirect/same-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/fetch-request/no-redirect/same-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/fetch-request/swap-origin-redirect/same-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/same-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/iframe-tag/no-redirect/same-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/same-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/module-worker/keep-origin-redirect/same-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/module-worker/no-redirect/same-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/script-tag/keep-origin-redirect/same-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/script-tag/no-redirect/same-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/script-tag/swap-origin-redirect/same-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/shared-worker/keep-origin-redirect/same-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/shared-worker/no-redirect/same-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/worker-request/keep-origin-redirect/same-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/worker-request/no-redirect/same-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/xhr-request/keep-origin-redirect/same-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/xhr-request/no-redirect/same-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/xhr-request/swap-origin-redirect/same-insecure.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/module-worker/no-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/module-worker/no-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/shared-worker/no-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/shared-worker/no-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/worker-request/no-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/worker-request/no-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/module-worker/keep-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/module-worker/no-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/shared-worker/keep-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/shared-worker/no-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/worker-request/keep-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/worker-request/no-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/fetch-request/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/fetch-request/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/script-tag/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/script-tag/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/xhr-request/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/xhr-request/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/fetch-request/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/fetch-request/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/script-tag/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/script-tag/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/xhr-request/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/xhr-request/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/fetch-request/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/fetch-request/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/iframe-tag/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/iframe-tag/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/module-worker/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/module-worker/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/script-tag/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/script-tag/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/shared-worker/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/shared-worker/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/worker-request/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/worker-request/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/xhr-request/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/xhr-request/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/fetch-request/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/fetch-request/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/iframe-tag/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/iframe-tag/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/script-tag/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/script-tag/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/xhr-request/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/xhr-request/no-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/fetch-request/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/script-tag/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/xhr-request/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/fetch-request/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/script-tag/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/xhr-request/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/fetch-request/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/iframe-tag/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/module-worker/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/module-worker/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/script-tag/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/shared-worker/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/shared-worker/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/worker-request/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/worker-request/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/xhr-request/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/fetch-request/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/script-tag/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/xhr-request/no-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html39
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/module-worker/no-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/shared-worker/no-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/worker-request/no-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/module-worker/keep-origin-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/module-worker/no-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/shared-worker/keep-origin-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/shared-worker/no-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/worker-request/keep-origin-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/worker-request/no-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html38
-rw-r--r--tests/wpt/web-platform-tests/resources/chromium/webxr-test.js15
-rw-r--r--tests/wpt/web-platform-tests/service-workers/service-worker/activation.https.html4
-rw-r--r--tests/wpt/web-platform-tests/service-workers/service-worker/detached-context.https.html2
-rw-r--r--tests/wpt/web-platform-tests/sms/interceptor.https.html94
-rw-r--r--tests/wpt/web-platform-tests/sms/sms_provider.js6
-rw-r--r--tests/wpt/web-platform-tests/sms/sms_receiver.idl2
-rw-r--r--tests/wpt/web-platform-tests/svg/animations/beginelement-instance-time-1.html28
-rw-r--r--tests/wpt/web-platform-tests/svg/extensibility/foreignObject/masked-ref.html2
-rw-r--r--tests/wpt/web-platform-tests/svg/extensibility/foreignObject/masked.html13
-rw-r--r--tests/wpt/web-platform-tests/svg/struct/scripted/autofocus-attribute.svg6
-rw-r--r--tests/wpt/web-platform-tests/tools/wpt/tests/test_wpt.py6
-rw-r--r--tests/wpt/web-platform-tests/trusted-types/block-eval.tentative.html22
-rw-r--r--tests/wpt/web-platform-tests/trusted-types/eval-with-permissive-csp.tentative.html9
-rw-r--r--tests/wpt/web-platform-tests/trusted-types/trusted-types-eval-reporting-no-unsafe-eval.tentative.https.html115
-rw-r--r--tests/wpt/web-platform-tests/trusted-types/trusted-types-eval-reporting-no-unsafe-eval.tentative.https.html.headers4
-rw-r--r--tests/wpt/web-platform-tests/trusted-types/trusted-types-eval-reporting-report-only.tentative.https.html107
-rw-r--r--tests/wpt/web-platform-tests/trusted-types/trusted-types-eval-reporting-report-only.tentative.https.html.headers4
-rw-r--r--tests/wpt/web-platform-tests/trusted-types/trusted-types-eval-reporting.tentative.https.html107
-rw-r--r--tests/wpt/web-platform-tests/trusted-types/trusted-types-eval-reporting.tentative.https.html.headers4
-rw-r--r--tests/wpt/web-platform-tests/webxr/xrSession_viewer_availability.https.html52
4480 files changed, 60329 insertions, 54909 deletions
diff --git a/tests/wpt/metadata/FileAPI/url/url-with-fetch.any.js.ini b/tests/wpt/metadata/FileAPI/url/url-with-fetch.any.js.ini
index 6a3af4e2ece..947e223fb28 100644
--- a/tests/wpt/metadata/FileAPI/url/url-with-fetch.any.js.ini
+++ b/tests/wpt/metadata/FileAPI/url/url-with-fetch.any.js.ini
@@ -14,9 +14,6 @@
[Revoke blob URL after creating Request, will fetch]
expected: FAIL
- [Revoke blob URL after calling fetch, fetch should succeed]
- expected: FAIL
-
[url-with-fetch.any.html]
[Untitled]
diff --git a/tests/wpt/metadata/MANIFEST.json b/tests/wpt/metadata/MANIFEST.json
index 0c87f8f92fc..a6a84127237 100644
--- a/tests/wpt/metadata/MANIFEST.json
+++ b/tests/wpt/metadata/MANIFEST.json
@@ -14557,12 +14557,6 @@
{}
]
],
- "pointerevents/extension/pointerevent_coalesced_events_attributes-manual.html": [
- [
- "pointerevents/extension/pointerevent_coalesced_events_attributes-manual.html",
- {}
- ]
- ],
"pointerevents/extension/pointerevent_getPredictedEvents_when_pointerlocked-manual.html": [
[
"pointerevents/extension/pointerevent_getPredictedEvents_when_pointerlocked-manual.html",
@@ -119061,6 +119055,18 @@
{}
]
],
+ "css/css-flexbox/flex-wrap-006.html": [
+ [
+ "css/css-flexbox/flex-wrap-006.html",
+ [
+ [
+ "/css/reference/ref-filled-green-100px-square.xht",
+ "=="
+ ]
+ ],
+ {}
+ ]
+ ],
"css/css-flexbox/flexbox-flex-direction-column-reverse.htm": [
[
"css/css-flexbox/flexbox-flex-direction-column-reverse.htm",
@@ -136015,6 +136021,18 @@
{}
]
],
+ "css/css-position/position-absolute-dynamic-static-position-table-cell.html": [
+ [
+ "css/css-position/position-absolute-dynamic-static-position-table-cell.html",
+ [
+ [
+ "/css/reference/ref-filled-green-100px-square.xht",
+ "=="
+ ]
+ ],
+ {}
+ ]
+ ],
"css/css-position/position-absolute-dynamic-static-position.html": [
[
"css/css-position/position-absolute-dynamic-static-position.html",
@@ -142055,6 +142073,18 @@
{}
]
],
+ "css/css-sizing/block-fit-content-as-initial.html": [
+ [
+ "css/css-sizing/block-fit-content-as-initial.html",
+ [
+ [
+ "/css/css-sizing/block-fit-content-as-initial-ref.html",
+ "=="
+ ]
+ ],
+ {}
+ ]
+ ],
"css/css-sizing/block-image-percentage-max-height-inside-inline.html": [
[
"css/css-sizing/block-image-percentage-max-height-inside-inline.html",
@@ -167563,6 +167593,18 @@
{}
]
],
+ "css/css-values/calc-zero-percent-height.html": [
+ [
+ "css/css-values/calc-zero-percent-height.html",
+ [
+ [
+ "/css/reference/ref-filled-green-100px-square-only.html",
+ "=="
+ ]
+ ],
+ {}
+ ]
+ ],
"css/css-values/ch-unit-001.html": [
[
"css/css-values/ch-unit-001.html",
@@ -203441,18 +203483,6 @@
{}
]
],
- "html/semantics/embedded-content/svg/intrinsicsize/intrinsicsize-svg-image.tentative.html": [
- [
- "html/semantics/embedded-content/svg/intrinsicsize/intrinsicsize-svg-image.tentative.html",
- [
- [
- "/html/semantics/embedded-content/svg/intrinsicsize/intrinsicsize-svg-image-ref.html",
- "=="
- ]
- ],
- {}
- ]
- ],
"html/semantics/embedded-content/the-audio-element/audio_001.htm": [
[
"html/semantics/embedded-content/the-audio-element/audio_001.htm",
@@ -205965,6 +205995,18 @@
{}
]
],
+ "mathml/relations/html5-tree/css-inline-style-dynamic.tentative.html": [
+ [
+ "mathml/relations/html5-tree/css-inline-style-dynamic.tentative.html",
+ [
+ [
+ "/mathml/relations/html5-tree/css-inline-style-dynamic.tentative-ref.html",
+ "=="
+ ]
+ ],
+ {}
+ ]
+ ],
"mathml/relations/html5-tree/dynamic-1.html": [
[
"mathml/relations/html5-tree/dynamic-1.html",
@@ -206505,6 +206547,18 @@
{}
]
],
+ "svg/extensibility/foreignObject/masked.html": [
+ [
+ "svg/extensibility/foreignObject/masked.html",
+ [
+ [
+ "/svg/extensibility/foreignObject/masked-ref.html",
+ "=="
+ ]
+ ],
+ {}
+ ]
+ ],
"svg/extensibility/foreignObject/position-svg-root-in-foreign-object.html": [
[
"svg/extensibility/foreignObject/position-svg-root-in-foreign-object.html",
@@ -245544,6 +245598,12 @@
"css/css-contain/reference/ref-if-there-is-no-red.xht": [
[]
],
+ "css/css-contain/support/60x60-green.png": [
+ []
+ ],
+ "css/css-contain/support/60x60-red.png": [
+ []
+ ],
"css/css-contain/support/blue-100x100.png": [
[]
],
@@ -254988,6 +255048,9 @@
"css/css-sizing/auto-scrollbar-inside-stf-abspos-ref.html": [
[]
],
+ "css/css-sizing/block-fit-content-as-initial-ref.html": [
+ []
+ ],
"css/css-sizing/clone-intrinsic-size-ref.html": [
[]
],
@@ -265647,6 +265710,9 @@
"domxpath/META.yml": [
[]
],
+ "domxpath/README.md": [
+ []
+ ],
"domxpath/xml_xpath_tests.xml": [
[]
],
@@ -266739,9 +266805,6 @@
"feature-policy/README.md": [
[]
],
- "feature-policy/experimental-features/intrinsicsize-with-unsized-media.tentative.https.sub.html.headers": [
- []
- ],
"feature-policy/experimental-features/layout-animations-disabled-tentative.html.headers": [
[]
],
@@ -272988,9 +273051,6 @@
"html/semantics/embedded-content/resources/should-not-load.html": [
[]
],
- "html/semantics/embedded-content/svg/intrinsicsize/intrinsicsize-svg-image-ref.html": [
- []
- ],
"html/semantics/embedded-content/the-area-element/resources/area-download-click.html": [
[]
],
@@ -273339,9 +273399,6 @@
"html/semantics/embedded-content/the-img-element/img-with-containment-and-size-ref.html": [
[]
],
- "html/semantics/embedded-content/the-img-element/intrinsicsize/intrinsicsize-without-unsized-media.tentative.https.sub.html.headers": [
- []
- ],
"html/semantics/embedded-content/the-img-element/ismap/img-ismap-coordinates-iframe-after.html": [
[]
],
@@ -273381,9 +273438,6 @@
"html/semantics/embedded-content/the-object-element/test1.html": [
[]
],
- "html/semantics/embedded-content/the-video-element/intrinsicsize/intrinsicsize-without-unsized-media.tentative.https.sub.html.headers": [
- []
- ],
"html/semantics/embedded-content/the-video-element/video_content-ref.htm": [
[]
],
@@ -273402,6 +273456,15 @@
"html/semantics/forms/autofocus/resources/child-autofocus.html": [
[]
],
+ "html/semantics/forms/autofocus/resources/erase-first.css": [
+ []
+ ],
+ "html/semantics/forms/autofocus/resources/frame-with-autofocus-element.html": [
+ []
+ ],
+ "html/semantics/forms/autofocus/resources/moving-autofocus-to-parent.html": [
+ []
+ ],
"html/semantics/forms/autofocus/resources/utils.js": [
[]
],
@@ -275976,6 +276039,9 @@
"mathml/relations/html5-tree/color-attributes-1-ref.html": [
[]
],
+ "mathml/relations/html5-tree/css-inline-style-dynamic.tentative-ref.html": [
+ []
+ ],
"mathml/relations/html5-tree/dynamic-1-ref.html": [
[]
],
@@ -276504,6 +276570,9 @@
"mixed-content/generic/sanity-checker.js": [
[]
],
+ "mixed-content/generic/test-case.sub.js": [
+ []
+ ],
"mixed-content/generic/tools/__init__.py": [
[]
],
@@ -277704,1690 +277773,1975 @@
"referrer-policy/css-integration/css-test-helper.js": [
[]
],
- "referrer-policy/generic/multiple-headers-and-values.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/generic/multiple-headers-combined.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/generic/multiple-headers-one-invalid.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/generic/multiple-headers-one-unknown-token.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/generic/multiple-headers.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/generic/referrer-policy-test-case.sub.js": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/generic/sanity-checker.js": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/generic/tools/__init__.py": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/generic/tools/clean.py": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/generic/tools/generate.py": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/generic/tools/regenerate": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/module-worker/no-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/shared-worker/no-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/worker-request/no-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/a-tag/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/fetch-request/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/img-tag/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/script-tag/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/xhr-request/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/a-tag/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/fetch-request/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/img-tag/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/script-tag/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/xhr-request/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/a-tag/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/fetch-request/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/iframe-tag/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/img-tag/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/module-worker/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/script-tag/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/shared-worker/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/worker-request/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/xhr-request/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/a-tag/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/fetch-request/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/iframe-tag/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/img-tag/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/script-tag/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/xhr-request/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/a-tag/no-redirect/cross-origin.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/cross-origin.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/no-redirect/cross-origin.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/cross-origin.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-origin.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/no-redirect/cross-origin.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-origin.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/cross-origin.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/no-redirect/cross-origin.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/cross-origin.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/cross-origin.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/no-redirect/cross-origin.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/cross-origin.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/cross-origin.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/no-redirect/cross-origin.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/cross-origin.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer/fetch/same-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/a-tag/no-redirect/cross-origin.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer/fetch/same-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/cross-origin.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer/fetch/same-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/no-redirect/cross-origin.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer/fetch/same-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/cross-origin.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer/fetch/same-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/cross-origin.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer/fetch/same-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/no-redirect/cross-origin.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/cross-origin.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/cross-origin.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/no-redirect/cross-origin.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/cross-origin.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/cross-origin.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/no-redirect/cross-origin.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/cross-origin.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/cross-origin.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/no-redirect/cross-origin.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/cross-origin.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/a-tag/no-redirect/same-origin-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/same-origin-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/no-redirect/same-origin-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/same-origin-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/same-origin-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/no-redirect/same-origin-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/same-origin-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/no-redirect/same-origin-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/same-origin-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/same-origin-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/module-worker/no-redirect/same-origin-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/same-origin-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/no-redirect/same-origin-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/same-origin-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/same-origin-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/shared-worker/no-redirect/same-origin-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/same-origin-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/worker-request/no-redirect/same-origin-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/same-origin-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/no-redirect/same-origin-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/same-origin-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/a-tag/no-redirect/same-origin-upgrade.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-upgrade.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/same-origin-upgrade.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer/sharedworker-classic/same-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-upgrade.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer/sharedworker-classic/same-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/same-origin-upgrade.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer/worker-classic/same-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer/worker-classic/same-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-upgrade.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer/worker-module/same-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/no-redirect/same-origin-upgrade.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer/worker-module/same-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-upgrade.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/no-redirect/same-origin-upgrade.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-upgrade.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/same-origin-upgrade.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer/xhr/same-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/cross-origin/http-http/a-tag/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer/xhr/same-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer/xhr/same-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/cross-origin/http-http/fetch-request/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer/xhr/same-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer/xhr/same-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/no-referrer/xhr/same-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/cross-origin/http-http/img-tag/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/cross-origin/http-http/script-tag/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/cross-origin/http-http/xhr-request/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/cross-origin/http-https/a-tag/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/cross-origin/http-https/fetch-request/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/cross-origin/http-https/img-tag/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/cross-origin/http-https/script-tag/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/cross-origin/http-https/xhr-request/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/same-origin/http-http/a-tag/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/same-origin/http-http/fetch-request/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/same-origin/http-http/iframe-tag/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/same-origin/http-http/img-tag/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/same-origin/http-http/module-worker/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/same-origin/http-http/script-tag/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/same-origin/http-http/shared-worker/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/same-origin/http-http/worker-request/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/same-origin/http-http/xhr-request/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/same-origin/http-https/a-tag/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/same-origin/http-https/fetch-request/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/same-origin/http-https/img-tag/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/same-origin/http-https/script-tag/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/same-origin/http-https/xhr-request/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/a-tag/no-redirect/cross-origin.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/cross-origin.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin/fetch/cross-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/no-redirect/cross-origin.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin/fetch/cross-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/cross-origin.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin/fetch/cross-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-origin.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin/fetch/cross-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/no-redirect/cross-origin.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin/fetch/cross-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-origin.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin/fetch/cross-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/cross-origin.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin/fetch/same-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/no-redirect/cross-origin.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin/fetch/same-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/cross-origin.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin/fetch/same-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/cross-origin.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin/fetch/same-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/no-redirect/cross-origin.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin/fetch/same-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/cross-origin.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin/fetch/same-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/cross-origin.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/no-redirect/cross-origin.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/cross-origin.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/a-tag/no-redirect/cross-origin.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/cross-origin.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/no-redirect/cross-origin.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/cross-origin.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin/iframe-tag/same-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/cross-origin.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin/iframe-tag/same-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/no-redirect/cross-origin.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin/iframe-tag/same-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/cross-origin.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin/iframe-tag/same-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/cross-origin.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin/iframe-tag/same-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/no-redirect/cross-origin.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin/iframe-tag/same-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/cross-origin.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin/img-tag/cross-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/cross-origin.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin/img-tag/cross-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/no-redirect/cross-origin.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin/img-tag/cross-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/cross-origin.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin/img-tag/cross-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/cross-origin.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin/img-tag/cross-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/no-redirect/cross-origin.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin/img-tag/cross-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/cross-origin.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin/img-tag/same-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/a-tag/no-redirect/same-origin-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin/img-tag/same-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/same-origin-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin/img-tag/same-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/no-redirect/same-origin-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin/img-tag/same-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/same-origin-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin/img-tag/same-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/same-origin-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin/img-tag/same-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/no-redirect/same-origin-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin/script-tag/cross-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin/script-tag/cross-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/same-origin-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin/script-tag/cross-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/no-redirect/same-origin-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin/script-tag/cross-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/same-origin-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin/script-tag/cross-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/same-origin-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin/script-tag/cross-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/module-worker/no-redirect/same-origin-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin/script-tag/same-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/same-origin-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin/script-tag/same-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/no-redirect/same-origin-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin/script-tag/same-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/same-origin-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin/script-tag/same-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/same-origin-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin/script-tag/same-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/shared-worker/no-redirect/same-origin-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin/script-tag/same-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/same-origin-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin/sharedworker-classic/same-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/worker-request/no-redirect/same-origin-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin/sharedworker-classic/same-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/same-origin-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin/worker-classic/same-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/no-redirect/same-origin-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin/worker-classic/same-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/same-origin-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin/worker-module/same-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/same-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin/worker-module/same-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/same-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin/xhr/cross-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/same-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin/xhr/cross-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/same-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin/xhr/cross-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/same-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin/xhr/cross-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/spec.src.json": [
+ "referrer-policy/gen/top.http-rp/origin/xhr/cross-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/spec_json.js": [
+ "referrer-policy/gen/top.http-rp/origin/xhr/cross-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/a-tag/no-redirect/cross-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin/xhr/same-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/cross-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin/xhr/same-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/no-redirect/cross-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin/xhr/same-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/cross-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin/xhr/same-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin/xhr/same-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/no-redirect/cross-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/origin/xhr/same-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/same-origin/fetch/cross-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/cross-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/same-origin/fetch/cross-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/no-redirect/cross-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/same-origin/fetch/cross-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/cross-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/same-origin/fetch/cross-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/cross-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/same-origin/fetch/cross-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/no-redirect/cross-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/same-origin/fetch/cross-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/cross-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/same-origin/fetch/same-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/cross-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/same-origin/fetch/same-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/no-redirect/cross-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/same-origin/fetch/same-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/cross-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/same-origin/fetch/same-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/same-origin/iframe-tag/same-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/same-origin/iframe-tag/same-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/a-tag/no-redirect/same-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/same-origin/img-tag/same-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/same-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/same-origin/img-tag/same-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/no-redirect/same-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/same-origin/img-tag/same-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/same-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/same-origin/img-tag/same-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/same-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/no-redirect/same-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/same-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/same-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/no-redirect/same-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/same-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/same-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/same-origin/script-tag/same-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/module-worker/no-redirect/same-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/same-origin/script-tag/same-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/same-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/same-origin/script-tag/same-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/no-redirect/same-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/same-origin/script-tag/same-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/same-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/same-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/shared-worker/no-redirect/same-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/same-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/worker-request/no-redirect/same-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/same-origin/worker-module/same-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/same-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/same-origin/worker-module/same-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/no-redirect/same-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/same-origin/xhr/cross-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/same-insecure.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/same-origin/xhr/cross-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/same-origin/xhr/cross-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/same-origin/xhr/cross-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/same-origin/xhr/cross-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/same-origin/xhr/cross-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/same-origin/xhr/same-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/same-origin/xhr/same-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/same-origin/xhr/same-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/same-origin/xhr/same-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/module-worker/no-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/shared-worker/no-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/worker-request/no-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin/fetch/same-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin/fetch/same-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin/fetch/same-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin/fetch/same-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin/fetch/same-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin/fetch/same-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/a-tag/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/fetch-request/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/script-tag/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/xhr-request/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/a-tag/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/fetch-request/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/script-tag/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/xhr-request/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/a-tag/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/fetch-request/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin/sharedworker-classic/same-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/iframe-tag/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin/sharedworker-classic/same-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin/worker-classic/same-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin/worker-classic/same-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin/worker-module/same-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin/worker-module/same-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/module-worker/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/script-tag/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/shared-worker/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin/xhr/same-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin/xhr/same-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/worker-request/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin/xhr/same-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin/xhr/same-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/xhr-request/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin/xhr/same-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/strict-origin/xhr/same-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/a-tag/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html.headers": [
+ []
+ ],
+ "referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html.headers": [
+ []
+ ],
+ "referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html.headers": [
+ []
+ ],
+ "referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html.headers": [
+ []
+ ],
+ "referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html.headers": [
+ []
+ ],
+ "referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html.headers": [
+ []
+ ],
+ "referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html.headers": [
+ []
+ ],
+ "referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html.headers": [
+ []
+ ],
+ "referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html.headers": [
+ []
+ ],
+ "referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html.headers": [
+ []
+ ],
+ "referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html.headers": [
+ []
+ ],
+ "referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html.headers": [
+ []
+ ],
+ "referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html.headers": [
+ []
+ ],
+ "referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html.headers": [
+ []
+ ],
+ "referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html.headers": [
+ []
+ ],
+ "referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html.headers": [
+ []
+ ],
+ "referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html.headers": [
+ []
+ ],
+ "referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html.headers": [
+ []
+ ],
+ "referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html.headers": [
+ []
+ ],
+ "referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html.headers": [
+ []
+ ],
+ "referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html.headers": [
+ []
+ ],
+ "referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html.headers": [
+ []
+ ],
+ "referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html.headers": [
+ []
+ ],
+ "referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html.headers": [
+ []
+ ],
+ "referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html.headers": [
+ []
+ ],
+ "referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html.headers": [
+ []
+ ],
+ "referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html.headers": [
+ []
+ ],
+ "referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html.headers": [
+ []
+ ],
+ "referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html.headers": [
+ []
+ ],
+ "referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html.headers": [
+ []
+ ],
+ "referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html.headers": [
+ []
+ ],
+ "referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html.headers": [
+ []
+ ],
+ "referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html.headers": [
+ []
+ ],
+ "referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html.headers": [
+ []
+ ],
+ "referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html.headers": [
+ []
+ ],
+ "referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html.headers": [
+ []
+ ],
+ "referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html.headers": [
+ []
+ ],
+ "referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html.headers": [
+ []
+ ],
+ "referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html.headers": [
+ []
+ ],
+ "referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html.headers": [
+ []
+ ],
+ "referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html.headers": [
+ []
+ ],
+ "referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html.headers": [
+ []
+ ],
+ "referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html.headers": [
+ []
+ ],
+ "referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html.headers": [
+ []
+ ],
+ "referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html.headers": [
+ []
+ ],
+ "referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html.headers": [
+ []
+ ],
+ "referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/fetch-request/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/iframe-tag/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/script-tag/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/xhr-request/no-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html.headers": [
[]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html.headers": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html.headers": [
+ []
+ ],
+ "referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html.headers": [
+ []
+ ],
+ "referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html.headers": [
+ []
+ ],
+ "referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html.headers": [
+ []
+ ],
+ "referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html.headers": [
+ []
+ ],
+ "referrer-policy/generic/multiple-headers-and-values.html.headers": [
+ []
+ ],
+ "referrer-policy/generic/multiple-headers-combined.html.headers": [
+ []
+ ],
+ "referrer-policy/generic/multiple-headers-one-invalid.html.headers": [
+ []
+ ],
+ "referrer-policy/generic/multiple-headers-one-unknown-token.html.headers": [
+ []
+ ],
+ "referrer-policy/generic/multiple-headers.html.headers": [
+ []
+ ],
+ "referrer-policy/generic/referrer-policy-test-case.sub.js": [
+ []
+ ],
+ "referrer-policy/generic/sanity-checker.js": [
+ []
+ ],
+ "referrer-policy/generic/test-case.sub.js": [
+ []
+ ],
+ "referrer-policy/generic/tools/__init__.py": [
+ []
+ ],
+ "referrer-policy/generic/tools/clean.py": [
+ []
+ ],
+ "referrer-policy/generic/tools/generate.py": [
+ []
+ ],
+ "referrer-policy/generic/tools/regenerate": [
+ []
+ ],
+ "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html.headers": [
+ []
+ ],
+ "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html.headers": [
+ []
+ ],
+ "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html.headers": [
+ []
+ ],
+ "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html.headers": [
+ []
+ ],
+ "referrer-policy/no-referrer/http-rp/cross-origin/http-http/a-tag/no-redirect/generic.http.html.headers": [
+ []
+ ],
+ "referrer-policy/no-referrer/http-rp/cross-origin/http-https/a-tag/no-redirect/generic.http.html.headers": [
+ []
+ ],
+ "referrer-policy/no-referrer/http-rp/same-origin/http-http/a-tag/no-redirect/generic.http.html.headers": [
+ []
+ ],
+ "referrer-policy/no-referrer/http-rp/same-origin/http-https/a-tag/no-redirect/generic.http.html.headers": [
+ []
+ ],
+ "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/a-tag/no-redirect/cross-origin.http.html.headers": [
+ []
+ ],
+ "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/a-tag/no-redirect/cross-origin.http.html.headers": [
+ []
+ ],
+ "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/a-tag/no-redirect/same-origin-insecure.http.html.headers": [
+ []
+ ],
+ "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/a-tag/no-redirect/same-origin-upgrade.http.html.headers": [
+ []
+ ],
+ "referrer-policy/origin/http-rp/cross-origin/http-http/a-tag/no-redirect/generic.http.html.headers": [
+ []
+ ],
+ "referrer-policy/origin/http-rp/cross-origin/http-https/a-tag/no-redirect/generic.http.html.headers": [
+ []
+ ],
+ "referrer-policy/origin/http-rp/same-origin/http-http/a-tag/no-redirect/generic.http.html.headers": [
+ []
+ ],
+ "referrer-policy/origin/http-rp/same-origin/http-https/a-tag/no-redirect/generic.http.html.headers": [
+ []
+ ],
+ "referrer-policy/same-origin/http-rp/cross-origin/http-http/a-tag/no-redirect/cross-origin.http.html.headers": [
+ []
+ ],
+ "referrer-policy/same-origin/http-rp/cross-origin/http-https/a-tag/no-redirect/cross-origin.http.html.headers": [
+ []
+ ],
+ "referrer-policy/same-origin/http-rp/same-origin/http-http/a-tag/no-redirect/same-origin-insecure.http.html.headers": [
+ []
+ ],
+ "referrer-policy/spec.src.json": [
+ []
+ ],
+ "referrer-policy/spec_json.js": [
+ []
+ ],
+ "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/a-tag/no-redirect/cross-insecure.http.html.headers": [
+ []
+ ],
+ "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html.headers": [
+ []
+ ],
+ "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/a-tag/no-redirect/same-insecure.http.html.headers": [
+ []
+ ],
+ "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html.headers": [
+ []
+ ],
+ "referrer-policy/strict-origin/http-rp/cross-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html.headers": [
+ []
+ ],
+ "referrer-policy/strict-origin/http-rp/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html.headers": [
+ []
+ ],
+ "referrer-policy/strict-origin/http-rp/same-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html.headers": [
+ []
+ ],
+ "referrer-policy/strict-origin/http-rp/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html.headers": [
+ []
+ ],
+ "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/a-tag/no-redirect/generic.http.html.headers": [
+ []
+ ],
+ "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/a-tag/no-redirect/generic.http.html.headers": [
+ []
+ ],
+ "referrer-policy/unsafe-url/http-rp/same-origin/http-http/a-tag/no-redirect/generic.http.html.headers": [
+ []
+ ],
+ "referrer-policy/unsafe-url/http-rp/same-origin/http-https/a-tag/no-redirect/generic.http.html.headers": [
[]
],
"remote-playback/META.yml": [
@@ -282270,6 +282624,9 @@
"svg/extensibility/foreignObject/foreign-object-size-ref.html": [
[]
],
+ "svg/extensibility/foreignObject/masked-ref.html": [
+ []
+ ],
"svg/extensibility/foreignObject/position-svg-root-in-foreign-object-ref.html": [
[]
],
@@ -287247,6 +287604,15 @@
"trusted-types/support/worker.js": [
[]
],
+ "trusted-types/trusted-types-eval-reporting-no-unsafe-eval.tentative.https.html.headers": [
+ []
+ ],
+ "trusted-types/trusted-types-eval-reporting-report-only.tentative.https.html.headers": [
+ []
+ ],
+ "trusted-types/trusted-types-eval-reporting.tentative.https.html.headers": [
+ []
+ ],
"trusted-types/trusted-types-report-only.tentative.https.html.headers": [
[]
],
@@ -298104,7 +298470,9 @@
"IndexedDB/idbobjectstore_createIndex15-autoincrement.htm": [
[
"IndexedDB/idbobjectstore_createIndex15-autoincrement.htm",
- {}
+ {
+ "timeout": "long"
+ }
]
],
"IndexedDB/idbobjectstore_createIndex2.htm": [
@@ -299189,6 +299557,40 @@
{}
]
],
+ "IndexedDB/transaction-relaxed-durability.tentative.any.js": [
+ [
+ "IndexedDB/transaction-relaxed-durability.tentative.any.html",
+ {
+ "script_metadata": [
+ [
+ "script",
+ "support-promises.js"
+ ],
+ [
+ "timeout",
+ "long"
+ ]
+ ],
+ "timeout": "long"
+ }
+ ],
+ [
+ "IndexedDB/transaction-relaxed-durability.tentative.any.worker.html",
+ {
+ "script_metadata": [
+ [
+ "script",
+ "support-promises.js"
+ ],
+ [
+ "timeout",
+ "long"
+ ]
+ ],
+ "timeout": "long"
+ }
+ ]
+ ],
"IndexedDB/transaction-requestqueue.htm": [
[
"IndexedDB/transaction-requestqueue.htm",
@@ -306652,14 +307054,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -306681,14 +307075,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -306710,14 +307096,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -306739,14 +307117,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -306768,14 +307138,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -306797,14 +307159,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -306826,14 +307180,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -306855,14 +307201,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -306884,14 +307222,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -306913,14 +307243,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -306942,14 +307264,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -306971,14 +307285,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -307000,14 +307306,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -307029,14 +307327,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -307058,14 +307348,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -307087,14 +307369,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -307116,14 +307390,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -307145,14 +307411,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -307174,14 +307432,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -307203,14 +307453,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -307232,14 +307474,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -307261,14 +307495,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -307290,14 +307516,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -307319,14 +307537,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -307348,14 +307558,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -307377,14 +307579,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -307406,14 +307600,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -307435,14 +307621,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -307464,14 +307642,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -307493,14 +307663,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -307522,14 +307684,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -307551,14 +307705,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -307580,14 +307726,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -307609,14 +307747,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -307638,14 +307768,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -307667,14 +307789,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -307696,14 +307810,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -307725,14 +307831,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -307754,14 +307852,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -307783,14 +307873,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -307812,14 +307894,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -308250,14 +308324,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -308279,14 +308345,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -308308,14 +308366,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -308337,14 +308387,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -308366,14 +308408,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -308395,14 +308429,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -308424,14 +308450,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -308453,14 +308471,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -308482,14 +308492,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -308511,14 +308513,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -308540,14 +308534,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -308569,14 +308555,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -308598,14 +308576,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -308627,14 +308597,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -308656,14 +308618,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -308685,14 +308639,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -308754,14 +308700,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -308783,14 +308721,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -308812,14 +308742,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -308841,14 +308763,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -308870,14 +308784,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -308899,14 +308805,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -308928,14 +308826,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -308957,14 +308847,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -308986,14 +308868,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -309015,14 +308889,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -309044,14 +308910,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -309073,14 +308931,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -309102,14 +308952,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -309131,14 +308973,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -309160,14 +308994,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -309189,14 +309015,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -309218,14 +309036,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -309247,14 +309057,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -309276,14 +309078,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -309305,14 +309099,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -309334,14 +309120,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -309363,14 +309141,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -309392,14 +309162,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -309421,14 +309183,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -309450,14 +309204,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -309479,14 +309225,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -309556,14 +309294,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -309585,14 +309315,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -309614,14 +309336,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -309643,14 +309357,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -309672,14 +309378,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -309701,14 +309399,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -309730,14 +309420,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -309791,14 +309473,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -309820,14 +309494,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -309849,14 +309515,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -309878,14 +309536,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -309907,14 +309557,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -309936,14 +309578,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -309965,14 +309599,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -309994,14 +309620,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -310023,14 +309641,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -310052,14 +309662,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -310081,14 +309683,6 @@
"script_metadata": [
[
"script",
- "/resources/testharness.js"
- ],
- [
- "script",
- "/resources/testharnessreport.js"
- ],
- [
- "script",
"/resources/testdriver.js"
],
[
@@ -325746,6 +325340,12 @@
{}
]
],
+ "css/css-text/overflow-wrap/overflow-wrap-break-word-white-space-crash.html": [
+ [
+ "css/css-text/overflow-wrap/overflow-wrap-break-word-white-space-crash.html",
+ {}
+ ]
+ ],
"css/css-text/overflow-wrap/word-wrap-alias.html": [
[
"css/css-text/overflow-wrap/word-wrap-alias.html",
@@ -335438,12 +335038,6 @@
{}
]
],
- "domxpath/interfaces.tentative.html": [
- [
- "domxpath/interfaces.tentative.html",
- {}
- ]
- ],
"domxpath/xml_xpath_runner.html": [
[
"domxpath/xml_xpath_runner.html",
@@ -346420,12 +346014,6 @@
{}
]
],
- "feature-policy/experimental-features/intrinsicsize-with-unsized-media.tentative.https.sub.html": [
- [
- "feature-policy/experimental-features/intrinsicsize-with-unsized-media.tentative.https.sub.html",
- {}
- ]
- ],
"feature-policy/experimental-features/layout-animations-disabled-tentative.html": [
[
"feature-policy/experimental-features/layout-animations-disabled-tentative.html",
@@ -358208,18 +357796,6 @@
{}
]
],
- "html/semantics/embedded-content/the-img-element/intrinsicsize/intrinsicsize-with-responsive-images.tentative.html": [
- [
- "html/semantics/embedded-content/the-img-element/intrinsicsize/intrinsicsize-with-responsive-images.tentative.html",
- {}
- ]
- ],
- "html/semantics/embedded-content/the-img-element/intrinsicsize/intrinsicsize-without-unsized-media.tentative.https.sub.html": [
- [
- "html/semantics/embedded-content/the-img-element/intrinsicsize/intrinsicsize-without-unsized-media.tentative.https.sub.html",
- {}
- ]
- ],
"html/semantics/embedded-content/the-img-element/invalid-src.html": [
[
"html/semantics/embedded-content/the-img-element/invalid-src.html",
@@ -358410,12 +357986,6 @@
{}
]
],
- "html/semantics/embedded-content/the-video-element/intrinsicsize/intrinsicsize-without-unsized-media.tentative.https.sub.html": [
- [
- "html/semantics/embedded-content/the-video-element/intrinsicsize/intrinsicsize-without-unsized-media.tentative.https.sub.html",
- {}
- ]
- ],
"html/semantics/embedded-content/the-video-element/video-tabindex.html": [
[
"html/semantics/embedded-content/the-video-element/video-tabindex.html",
@@ -358446,6 +358016,18 @@
{}
]
],
+ "html/semantics/forms/autofocus/autofocus-on-stable-document.html": [
+ [
+ "html/semantics/forms/autofocus/autofocus-on-stable-document.html",
+ {}
+ ]
+ ],
+ "html/semantics/forms/autofocus/first-reconnected.html": [
+ [
+ "html/semantics/forms/autofocus/first-reconnected.html",
+ {}
+ ]
+ ],
"html/semantics/forms/autofocus/first-when-later-but-before.html": [
[
"html/semantics/forms/autofocus/first-when-later-but-before.html",
@@ -358464,6 +358046,12 @@
{}
]
],
+ "html/semantics/forms/autofocus/focusable-area-in-top-document.html": [
+ [
+ "html/semantics/forms/autofocus/focusable-area-in-top-document.html",
+ {}
+ ]
+ ],
"html/semantics/forms/autofocus/no-cross-origin-autofocus.html": [
[
"html/semantics/forms/autofocus/no-cross-origin-autofocus.html",
@@ -358472,18 +358060,66 @@
}
]
],
+ "html/semantics/forms/autofocus/no-sandboxed-automatic-features.html": [
+ [
+ "html/semantics/forms/autofocus/no-sandboxed-automatic-features.html",
+ {}
+ ]
+ ],
"html/semantics/forms/autofocus/not-on-first-task.html": [
[
"html/semantics/forms/autofocus/not-on-first-task.html",
{}
]
],
+ "html/semantics/forms/autofocus/queue-non-focusable.html": [
+ [
+ "html/semantics/forms/autofocus/queue-non-focusable.html",
+ {}
+ ]
+ ],
+ "html/semantics/forms/autofocus/skip-another-top-level-browsing-context.html": [
+ [
+ "html/semantics/forms/autofocus/skip-another-top-level-browsing-context.html",
+ {}
+ ]
+ ],
+ "html/semantics/forms/autofocus/skip-document-with-fragment.html": [
+ [
+ "html/semantics/forms/autofocus/skip-document-with-fragment.html",
+ {}
+ ]
+ ],
+ "html/semantics/forms/autofocus/skip-non-focusable.html": [
+ [
+ "html/semantics/forms/autofocus/skip-non-focusable.html",
+ {}
+ ]
+ ],
+ "html/semantics/forms/autofocus/skip-not-fully-active.html": [
+ [
+ "html/semantics/forms/autofocus/skip-not-fully-active.html",
+ {}
+ ]
+ ],
+ "html/semantics/forms/autofocus/spin-by-blocking-style-sheet.html": [
+ [
+ "html/semantics/forms/autofocus/spin-by-blocking-style-sheet.html",
+ {}
+ ]
+ ],
"html/semantics/forms/autofocus/supported-elements.html": [
[
"html/semantics/forms/autofocus/supported-elements.html",
{}
]
],
+ "html/semantics/forms/autofocus/update-the-rendering.html": [
+ [
+ "html/semantics/forms/autofocus/update-the-rendering.html",
+ {}
+ ]
+ ],
"html/semantics/forms/constraints/form-validation-checkValidity.html": [
[
"html/semantics/forms/constraints/form-validation-checkValidity.html",
@@ -382888,6 +382524,14 @@
}
]
],
+ "pointerevents/extension/pointerevent_coalesced_events_attributes.html": [
+ [
+ "pointerevents/extension/pointerevent_coalesced_events_attributes.html",
+ {
+ "testdriver": true
+ }
+ ]
+ ],
"pointerevents/extension/pointerevent_constructor.html": [
[
"pointerevents/extension/pointerevent_constructor.html",
@@ -384333,9675 +383977,10071 @@
{}
]
],
- "referrer-policy/generic/iframe-src-change.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html": [
[
- "referrer-policy/generic/iframe-src-change.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/generic/inheritance/iframe-inheritance-data.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html": [
[
- "referrer-policy/generic/inheritance/iframe-inheritance-data.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/generic/inheritance/iframe-inheritance-srcdoc-child.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html": [
[
- "referrer-policy/generic/inheritance/iframe-inheritance-srcdoc-child.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/generic/inheritance/iframe-inheritance-srcdoc.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html": [
[
- "referrer-policy/generic/inheritance/iframe-inheritance-srcdoc.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/generic/link-rel-prefetch.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html": [
[
- "referrer-policy/generic/link-rel-prefetch.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/generic/multiple-headers-and-values.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html": [
[
- "referrer-policy/generic/multiple-headers-and-values.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/generic/multiple-headers-combined.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html": [
[
- "referrer-policy/generic/multiple-headers-combined.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/generic/multiple-headers-one-invalid.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html": [
[
- "referrer-policy/generic/multiple-headers-one-invalid.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/generic/multiple-headers-one-unknown-token.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html": [
[
- "referrer-policy/generic/multiple-headers-one-unknown-token.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/generic/multiple-headers.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html": [
[
- "referrer-policy/generic/multiple-headers.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/generic/sandboxed-iframe-with-opaque-origin.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html": [
[
- "referrer-policy/generic/sandboxed-iframe-with-opaque-origin.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/generic/subresource-test/area-navigate.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html": [
[
- "referrer-policy/generic/subresource-test/area-navigate.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/generic/subresource-test/attr-referrer-invalid-value.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-http.keep-origin.http.html": [
[
- "referrer-policy/generic/subresource-test/attr-referrer-invalid-value.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/generic/subresource-test/fetch-messaging.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-http.no-redirect.http.html": [
[
- "referrer-policy/generic/subresource-test/fetch-messaging.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/generic/subresource-test/iframe-messaging.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-http.swap-origin.http.html": [
[
- "referrer-policy/generic/subresource-test/iframe-messaging.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/generic/subresource-test/image-decoding.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-https.keep-origin.http.html": [
[
- "referrer-policy/generic/subresource-test/image-decoding.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/generic/subresource-test/link-navigate.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-https.no-redirect.http.html": [
[
- "referrer-policy/generic/subresource-test/link-navigate.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/generic/subresource-test/script-messaging.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-https.swap-origin.http.html": [
[
- "referrer-policy/generic/subresource-test/script-messaging.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/generic/subresource-test/worker-messaging.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-http.keep-origin.http.html": [
[
- "referrer-policy/generic/subresource-test/worker-messaging.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/generic/subresource-test/xhr-messaging.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-http.no-redirect.http.html": [
[
- "referrer-policy/generic/subresource-test/xhr-messaging.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/generic/unsupported-csp-referrer-directive.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-http.swap-origin.http.html": [
[
- "referrer-policy/generic/unsupported-csp-referrer-directive.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-https.keep-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-https.no-redirect.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-https.swap-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-http.swap-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-https.keep-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-https.no-redirect.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-https.swap-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-http.no-redirect.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-http.swap-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-https.keep-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-https.no-redirect.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-https.swap-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-http.no-redirect.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-http.swap-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-https.keep-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-https.no-redirect.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-https.swap-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-http.no-redirect.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-http.swap-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-https.keep-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-https.no-redirect.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-https.swap-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-http.no-redirect.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-http.swap-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-https.swap-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-http.swap-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-https.keep-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-https.no-redirect.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-https.swap-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-http.no-redirect.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-http.swap-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-https.keep-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-https.no-redirect.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-https.swap-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-http.no-redirect.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-http.swap-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-https.keep-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-https.no-redirect.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-https.swap-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-http.no-redirect.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-http.swap-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-https.keep-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-https.no-redirect.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-https.swap-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/same-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/same-http.no-redirect.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/same-http.swap-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/same-https.keep-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/module-worker/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/same-https.no-redirect.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/module-worker/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/same-https.swap-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/shared-worker/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/shared-worker/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/worker-request/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/worker-request/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/module-worker/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-http.no-redirect.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/module-worker/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/module-worker/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-http.swap-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/module-worker/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-https.keep-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-https.no-redirect.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-https.swap-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/shared-worker/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer/fetch/same-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/shared-worker/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer/fetch/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/shared-worker/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer/fetch/same-http.no-redirect.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/shared-worker/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer/fetch/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/worker-request/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer/fetch/same-http.swap-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/worker-request/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer/fetch/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/worker-request/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer/fetch/same-https.keep-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/worker-request/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer/fetch/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer/fetch/same-https.no-redirect.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer/fetch/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer/fetch/same-https.swap-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer/fetch/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-http.no-redirect.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-http.swap-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-https.keep-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-https.no-redirect.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-https.swap-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-http.no-redirect.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-http.swap-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-https.keep-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-https.no-redirect.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-https.swap-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-http.no-redirect.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-http.swap-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-https.keep-origin.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-https.no-redirect.http.html": [
[
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/a-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-https.swap-origin.http.html": [
[
- "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/a-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-http.no-redirect.http.html": [
[
- "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-http.swap-origin.http.html": [
[
- "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-https.keep-origin.http.html": [
[
- "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/img-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-https.no-redirect.http.html": [
[
- "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/img-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-https.swap-origin.http.html": [
[
- "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/script-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-http.no-redirect.http.html": [
[
- "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/script-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-http.swap-origin.http.html": [
[
- "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/a-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-https.keep-origin.http.html": [
[
- "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/a-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-https.no-redirect.http.html": [
[
- "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-https.swap-origin.http.html": [
[
- "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-http.no-redirect.http.html": [
[
- "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/img-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-http.swap-origin.http.html": [
[
- "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/img-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-https.keep-origin.http.html": [
[
- "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-https.no-redirect.http.html": [
[
- "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/script-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-https.swap-origin.http.html": [
[
- "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/script-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer/sharedworker-classic/same-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer/sharedworker-classic/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/a-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer/sharedworker-classic/same-http.no-redirect.http.html": [
[
- "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/a-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer/sharedworker-classic/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer/worker-classic/same-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer/worker-classic/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/iframe-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer/worker-classic/same-http.no-redirect.http.html": [
[
- "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/iframe-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer/worker-classic/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer/worker-module/same-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer/worker-module/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer/worker-module/same-http.no-redirect.http.html": [
[
- "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer/worker-module/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/img-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/img-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-http.no-redirect.http.html": [
[
- "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-http.swap-origin.http.html": [
[
- "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/script-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-https.keep-origin.http.html": [
[
- "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/script-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-https.no-redirect.http.html": [
[
- "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/a-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-https.swap-origin.http.html": [
[
- "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/a-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer/xhr/same-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer/xhr/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/iframe-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer/xhr/same-http.no-redirect.http.html": [
[
- "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/iframe-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer/xhr/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer/xhr/same-http.swap-origin.http.html": [
[
- "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer/xhr/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer/xhr/same-https.keep-origin.http.html": [
[
- "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer/xhr/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/img-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer/xhr/same-https.no-redirect.http.html": [
[
- "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/img-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer/xhr/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/no-referrer/xhr/same-https.swap-origin.http.html": [
[
- "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/no-referrer/xhr/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/script-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html": [
[
- "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/script-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html": [
[
- "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/a-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html": [
[
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/a-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html": [
[
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/fetch-request/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html": [
[
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/fetch-request/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html": [
[
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.swap-origin.http.html": [
[
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-https.keep-origin.http.html": [
[
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-https.no-redirect.http.html": [
[
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/img-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-https.swap-origin.http.html": [
[
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/img-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html": [
[
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/script-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html": [
[
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/script-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html": [
[
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html": [
[
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/xhr-request/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html": [
[
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/xhr-request/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/a-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html": [
[
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/a-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html": [
[
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/fetch-request/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html": [
[
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/fetch-request/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html": [
[
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html": [
[
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html": [
[
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html": [
[
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/img-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html": [
[
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/img-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html": [
[
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html": [
[
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/script-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/script-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html": [
[
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.swap-origin.http.html": [
[
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/xhr-request/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-https.keep-origin.http.html": [
[
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/xhr-request/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-https.no-redirect.http.html": [
[
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/a-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-https.swap-origin.http.html": [
[
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/a-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/fetch-request/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html": [
[
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/fetch-request/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html": [
[
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html": [
[
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/iframe-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html": [
[
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/iframe-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html": [
[
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/img-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html": [
[
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/img-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.swap-origin.http.html": [
[
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-https.keep-origin.http.html": [
[
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/module-worker/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-https.no-redirect.http.html": [
[
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/module-worker/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-https.swap-origin.http.html": [
[
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/script-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/script-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html": [
[
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/shared-worker/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html": [
[
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/shared-worker/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/worker-request/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html": [
[
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/worker-request/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/xhr-request/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-http.no-redirect.http.html": [
[
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/xhr-request/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-http.swap-origin.http.html": [
[
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/a-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-https.keep-origin.http.html": [
[
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/a-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-https.no-redirect.http.html": [
[
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/fetch-request/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-https.swap-origin.http.html": [
[
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/fetch-request/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html": [
[
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/iframe-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.swap-origin.http.html": [
[
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/iframe-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-https.keep-origin.http.html": [
[
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-https.no-redirect.http.html": [
[
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/img-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-https.swap-origin.http.html": [
[
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/img-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin/fetch/cross-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin/fetch/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin/fetch/cross-http.no-redirect.http.html": [
[
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin/fetch/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/script-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin/fetch/cross-http.swap-origin.http.html": [
[
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/script-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin/fetch/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin/fetch/cross-https.keep-origin.http.html": [
[
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin/fetch/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin/fetch/cross-https.no-redirect.http.html": [
[
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin/fetch/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/xhr-request/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin/fetch/cross-https.swap-origin.http.html": [
[
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/xhr-request/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin/fetch/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin/fetch/same-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin/fetch/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/a-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin/fetch/same-http.no-redirect.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/a-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin/fetch/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin/fetch/same-http.swap-origin.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin/fetch/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/fetch-request/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin/fetch/same-https.keep-origin.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/fetch-request/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin/fetch/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin/fetch/same-https.no-redirect.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin/fetch/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin/fetch/same-https.swap-origin.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin/fetch/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-http.no-redirect.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-http.swap-origin.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/img-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-https.keep-origin.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/img-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-https.no-redirect.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-https.swap-origin.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/script-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin/iframe-tag/same-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/script-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin/iframe-tag/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin/iframe-tag/same-http.no-redirect.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin/iframe-tag/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin/iframe-tag/same-http.swap-origin.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin/iframe-tag/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/xhr-request/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin/iframe-tag/same-https.keep-origin.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/xhr-request/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin/iframe-tag/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin/iframe-tag/same-https.no-redirect.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin/iframe-tag/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/a-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin/iframe-tag/same-https.swap-origin.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/a-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin/iframe-tag/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin/img-tag/cross-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin/img-tag/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/fetch-request/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin/img-tag/cross-http.no-redirect.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/fetch-request/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin/img-tag/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin/img-tag/cross-http.swap-origin.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin/img-tag/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin/img-tag/cross-https.keep-origin.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin/img-tag/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin/img-tag/cross-https.no-redirect.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin/img-tag/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin/img-tag/cross-https.swap-origin.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin/img-tag/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin/img-tag/same-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin/img-tag/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/img-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin/img-tag/same-http.no-redirect.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/img-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin/img-tag/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin/img-tag/same-http.swap-origin.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin/img-tag/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin/img-tag/same-https.keep-origin.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin/img-tag/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/script-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin/img-tag/same-https.no-redirect.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/script-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin/img-tag/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin/img-tag/same-https.swap-origin.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin/img-tag/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin/script-tag/cross-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin/script-tag/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/xhr-request/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin/script-tag/cross-http.no-redirect.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/xhr-request/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin/script-tag/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin/script-tag/cross-http.swap-origin.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin/script-tag/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/a-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin/script-tag/cross-https.keep-origin.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/a-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin/script-tag/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin/script-tag/cross-https.no-redirect.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin/script-tag/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/fetch-request/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin/script-tag/cross-https.swap-origin.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/fetch-request/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin/script-tag/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin/script-tag/same-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin/script-tag/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin/script-tag/same-http.no-redirect.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin/script-tag/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/iframe-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin/script-tag/same-http.swap-origin.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/iframe-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin/script-tag/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin/script-tag/same-https.keep-origin.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin/script-tag/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin/script-tag/same-https.no-redirect.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin/script-tag/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/img-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin/script-tag/same-https.swap-origin.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/img-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin/script-tag/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin/sharedworker-classic/same-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin/sharedworker-classic/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/module-worker/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin/sharedworker-classic/same-http.no-redirect.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/module-worker/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin/sharedworker-classic/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/module-worker/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin/worker-classic/same-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/module-worker/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin/worker-classic/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin/worker-classic/same-http.no-redirect.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin/worker-classic/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/script-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin/worker-module/same-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/script-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin/worker-module/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin/worker-module/same-http.no-redirect.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin/worker-module/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/shared-worker/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin/xhr/cross-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/shared-worker/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin/xhr/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/shared-worker/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin/xhr/cross-http.no-redirect.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/shared-worker/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin/xhr/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/worker-request/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin/xhr/cross-http.swap-origin.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/worker-request/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin/xhr/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/worker-request/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin/xhr/cross-https.keep-origin.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/worker-request/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin/xhr/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin/xhr/cross-https.no-redirect.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin/xhr/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/xhr-request/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin/xhr/cross-https.swap-origin.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/xhr-request/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin/xhr/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin/xhr/same-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin/xhr/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-https/a-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin/xhr/same-http.no-redirect.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-https/a-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin/xhr/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin/xhr/same-http.swap-origin.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin/xhr/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-https/fetch-request/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin/xhr/same-https.keep-origin.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-https/fetch-request/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin/xhr/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin/xhr/same-https.no-redirect.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin/xhr/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/origin/xhr/same-https.swap-origin.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/origin/xhr/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/same-origin/fetch/cross-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/same-origin/fetch/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/same-origin/fetch/cross-http.no-redirect.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/same-origin/fetch/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/same-origin/fetch/cross-http.swap-origin.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/same-origin/fetch/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-https/img-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/same-origin/fetch/cross-https.keep-origin.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-https/img-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/same-origin/fetch/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/same-origin/fetch/cross-https.no-redirect.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/same-origin/fetch/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/same-origin/fetch/cross-https.swap-origin.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/same-origin/fetch/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-https/script-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/same-origin/fetch/same-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-https/script-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/same-origin/fetch/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/same-origin/fetch/same-http.no-redirect.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/same-origin/fetch/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/same-origin/fetch/same-http.swap-origin.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/same-origin/fetch/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-https/xhr-request/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/same-origin/fetch/same-https.swap-origin.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-https/xhr-request/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/same-origin/fetch/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-http.keep-origin.http.html": [
[
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/a-tag/no-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-http.no-redirect.http.html": [
[
- "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/a-tag/no-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-http.swap-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/iframe-tag/no-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-https.keep-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/iframe-tag/no-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-https.no-redirect.http.html": [
[
- "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-https.swap-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/no-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/no-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html": [
[
- "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/same-origin/iframe-tag/same-http.swap-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/same-origin/iframe-tag/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/script-tag/no-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/same-origin/iframe-tag/same-https.swap-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/script-tag/no-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/same-origin/iframe-tag/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-http.keep-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/a-tag/no-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-http.no-redirect.http.html": [
[
- "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/a-tag/no-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-http.swap-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/iframe-tag/no-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-https.keep-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/iframe-tag/no-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-https.no-redirect.http.html": [
[
- "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-https.swap-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/no-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/same-origin/img-tag/same-http.keep-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/no-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/same-origin/img-tag/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/same-origin/img-tag/same-http.no-redirect.http.html": [
[
- "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/same-origin/img-tag/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/same-origin/img-tag/same-http.swap-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/same-origin/img-tag/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/script-tag/no-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/same-origin/img-tag/same-https.swap-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/script-tag/no-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/same-origin/img-tag/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-http.keep-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/a-tag/no-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-http.no-redirect.http.html": [
[
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/a-tag/no-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-http.swap-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/iframe-tag/no-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-https.keep-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/iframe-tag/no-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-https.no-redirect.http.html": [
[
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-https.swap-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/no-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.http-rp/same-origin/script-tag/same-http.keep-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/no-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.http-rp/same-origin/script-tag/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.http-rp/same-origin/script-tag/same-http.no-redirect.http.html": [
[
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.http-rp/same-origin/script-tag/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/script-tag/keep-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.http-rp/same-origin/script-tag/same-http.swap-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/script-tag/keep-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.http-rp/same-origin/script-tag/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/script-tag/no-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.http-rp/same-origin/script-tag/same-https.swap-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/script-tag/no-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.http-rp/same-origin/script-tag/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/script-tag/swap-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/script-tag/swap-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/a-tag/no-redirect/same-origin-upgrade.http.html": [
+ "referrer-policy/gen/top.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html": [
[
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/a-tag/no-redirect/same-origin-upgrade.http.html",
+ "referrer-policy/gen/top.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-upgrade.http.html": [
+ "referrer-policy/gen/top.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-upgrade.http.html",
+ "referrer-policy/gen/top.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/no-redirect/same-origin-upgrade.http.html": [
+ "referrer-policy/gen/top.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html": [
[
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/no-redirect/same-origin-upgrade.http.html",
+ "referrer-policy/gen/top.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.http-rp/same-origin/worker-module/same-http.keep-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.http-rp/same-origin/worker-module/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-upgrade.http.html": [
+ "referrer-policy/gen/top.http-rp/same-origin/worker-module/same-http.no-redirect.http.html": [
[
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-upgrade.http.html",
+ "referrer-policy/gen/top.http-rp/same-origin/worker-module/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/no-redirect/same-origin-upgrade.http.html": [
+ "referrer-policy/gen/top.http-rp/same-origin/xhr/cross-http.keep-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/no-redirect/same-origin-upgrade.http.html",
+ "referrer-policy/gen/top.http-rp/same-origin/xhr/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.http-rp/same-origin/xhr/cross-http.no-redirect.http.html": [
[
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.http-rp/same-origin/xhr/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-upgrade.http.html": [
+ "referrer-policy/gen/top.http-rp/same-origin/xhr/cross-http.swap-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-upgrade.http.html",
+ "referrer-policy/gen/top.http-rp/same-origin/xhr/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/no-redirect/same-origin-upgrade.http.html": [
+ "referrer-policy/gen/top.http-rp/same-origin/xhr/cross-https.keep-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/no-redirect/same-origin-upgrade.http.html",
+ "referrer-policy/gen/top.http-rp/same-origin/xhr/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.http-rp/same-origin/xhr/cross-https.no-redirect.http.html": [
[
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.http-rp/same-origin/xhr/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/a-tag/no-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/same-origin/xhr/cross-https.swap-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/a-tag/no-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/same-origin/xhr/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/same-origin/xhr/same-http.keep-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/same-origin/xhr/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/no-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/same-origin/xhr/same-http.no-redirect.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/no-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/same-origin/xhr/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/same-origin/xhr/same-http.swap-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/same-origin/xhr/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/same-origin/xhr/same-https.swap-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/same-origin/xhr/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/no-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/no-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/no-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/no-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/no-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/no-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/no-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/no-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/a-tag/no-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/a-tag/no-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/no-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/no-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/no-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/no-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/no-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/no-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/no-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/no-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/no-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/no-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/a-tag/no-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/a-tag/no-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/no-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/no-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/no-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.swap-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/no-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-https.keep-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-https.no-redirect.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/no-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-https.swap-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/no-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/module-worker/no-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/module-worker/no-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/no-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/no-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/shared-worker/no-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/shared-worker/no-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.swap-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/worker-request/no-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-https.keep-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/worker-request/no-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-https.no-redirect.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/no-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-https.swap-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/no-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/a-tag/no-redirect/same-origin-upgrade.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/a-tag/no-redirect/same-origin-upgrade.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-upgrade.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-upgrade.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/same-origin-upgrade.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/same-origin-upgrade.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-upgrade.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-upgrade.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/same-origin-upgrade.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-http.keep-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/same-origin-upgrade.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-http.no-redirect.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-upgrade.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-http.swap-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-upgrade.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/no-redirect/same-origin-upgrade.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-https.keep-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/no-redirect/same-origin-upgrade.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-https.no-redirect.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-upgrade.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-https.swap-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-upgrade.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/no-redirect/same-origin-upgrade.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/no-redirect/same-origin-upgrade.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-upgrade.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.swap-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-upgrade.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/same-origin-upgrade.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-https.keep-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/same-origin-upgrade.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-https.no-redirect.http.html": [
[
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/a-tag/no-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-https.swap-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/a-tag/no-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/fetch-request/keep-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-http.keep-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/fetch-request/keep-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/fetch-request/no-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-http.no-redirect.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/fetch-request/no-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/fetch-request/swap-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-http.swap-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/fetch-request/swap-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-https.keep-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/iframe-tag/no-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-https.no-redirect.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/iframe-tag/no-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-https.swap-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin/fetch/same-http.keep-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin/fetch/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/no-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin/fetch/same-http.no-redirect.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/no-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin/fetch/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin/fetch/same-http.swap-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin/fetch/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin/fetch/same-https.keep-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin/fetch/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/script-tag/no-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin/fetch/same-https.no-redirect.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/script-tag/no-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin/fetch/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin/fetch/same-https.swap-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin/fetch/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/xhr-request/keep-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-http.keep-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/xhr-request/keep-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/xhr-request/no-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-http.no-redirect.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/xhr-request/no-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/xhr-request/swap-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-http.swap-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/xhr-request/swap-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/a-tag/no-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-https.keep-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/a-tag/no-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/fetch-request/keep-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-https.no-redirect.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/fetch-request/keep-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/fetch-request/no-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-https.swap-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/fetch-request/no-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/fetch-request/swap-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-http.keep-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/fetch-request/swap-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-http.no-redirect.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/iframe-tag/no-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-http.swap-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/iframe-tag/no-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-https.keep-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-https.no-redirect.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/img-tag/no-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-https.swap-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/img-tag/no-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-http.keep-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-http.no-redirect.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/script-tag/no-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-http.swap-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/script-tag/no-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-https.keep-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/xhr-request/keep-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-https.no-redirect.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/xhr-request/keep-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/xhr-request/no-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-https.swap-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/xhr-request/no-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/xhr-request/swap-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-http.keep-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/xhr-request/swap-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/a-tag/no-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-http.no-redirect.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/a-tag/no-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/fetch-request/keep-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-http.swap-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/fetch-request/keep-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/fetch-request/no-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-https.keep-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/fetch-request/no-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/fetch-request/swap-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-https.no-redirect.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/fetch-request/swap-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-https.swap-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/iframe-tag/no-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-http.keep-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/iframe-tag/no-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-http.no-redirect.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/img-tag/keep-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-http.swap-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/img-tag/keep-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/img-tag/no-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-https.keep-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/img-tag/no-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/img-tag/swap-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-https.no-redirect.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/img-tag/swap-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/module-worker/keep-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-https.swap-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/module-worker/keep-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/module-worker/no-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-http.keep-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/module-worker/no-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/script-tag/keep-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-http.no-redirect.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/script-tag/keep-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/script-tag/no-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-http.swap-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/script-tag/no-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/script-tag/swap-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-https.keep-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/script-tag/swap-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/shared-worker/keep-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-https.no-redirect.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/shared-worker/keep-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/shared-worker/no-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-https.swap-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/shared-worker/no-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/worker-request/keep-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin/sharedworker-classic/same-http.keep-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/worker-request/keep-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin/sharedworker-classic/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/worker-request/no-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin/sharedworker-classic/same-http.no-redirect.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/worker-request/no-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin/sharedworker-classic/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/xhr-request/keep-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin/worker-classic/same-http.keep-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/xhr-request/keep-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin/worker-classic/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/xhr-request/no-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin/worker-classic/same-http.no-redirect.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/xhr-request/no-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin/worker-classic/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/xhr-request/swap-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin/worker-module/same-http.keep-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/xhr-request/swap-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin/worker-module/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/a-tag/no-redirect/same-origin-upgrade.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin/worker-module/same-http.no-redirect.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/a-tag/no-redirect/same-origin-upgrade.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin/worker-module/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-upgrade.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-http.keep-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-upgrade.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/no-redirect/same-origin-upgrade.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-http.no-redirect.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/no-redirect/same-origin-upgrade.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-http.swap-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-upgrade.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-https.keep-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-upgrade.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/same-origin-upgrade.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-https.no-redirect.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/same-origin-upgrade.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-https.swap-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-upgrade.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin/xhr/same-http.keep-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-upgrade.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin/xhr/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/no-redirect/same-origin-upgrade.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin/xhr/same-http.no-redirect.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/no-redirect/same-origin-upgrade.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin/xhr/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin/xhr/same-http.swap-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin/xhr/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-upgrade.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin/xhr/same-https.keep-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-upgrade.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin/xhr/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/no-redirect/same-origin-upgrade.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin/xhr/same-https.no-redirect.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/no-redirect/same-origin-upgrade.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin/xhr/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.http-rp/strict-origin/xhr/same-https.swap-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.http-rp/strict-origin/xhr/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-upgrade.http.html": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-upgrade.http.html",
+ "referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/no-redirect/same-origin-upgrade.http.html": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/no-redirect/same-origin-upgrade.http.html",
+ "referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html": [
[
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin/attr-referrer/cross-origin/http-http/a-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html": [
[
- "referrer-policy/origin/attr-referrer/cross-origin/http-http/a-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin/attr-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html": [
[
- "referrer-policy/origin/attr-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin/attr-referrer/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html": [
[
- "referrer-policy/origin/attr-referrer/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin/attr-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html": [
[
- "referrer-policy/origin/attr-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html": [
[
- "referrer-policy/origin/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin/attr-referrer/cross-origin/http-http/img-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html": [
[
- "referrer-policy/origin/attr-referrer/cross-origin/http-http/img-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html": [
[
- "referrer-policy/origin/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin/attr-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html": [
[
- "referrer-policy/origin/attr-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin/attr-referrer/cross-origin/http-http/script-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html": [
[
- "referrer-policy/origin/attr-referrer/cross-origin/http-http/script-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin/attr-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html": [
[
- "referrer-policy/origin/attr-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin/attr-referrer/cross-origin/http-https/a-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html": [
[
- "referrer-policy/origin/attr-referrer/cross-origin/http-https/a-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin/attr-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html": [
[
- "referrer-policy/origin/attr-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin/attr-referrer/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html": [
[
- "referrer-policy/origin/attr-referrer/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin/attr-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html": [
[
- "referrer-policy/origin/attr-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html": [
[
- "referrer-policy/origin/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin/attr-referrer/cross-origin/http-https/img-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html": [
[
- "referrer-policy/origin/attr-referrer/cross-origin/http-https/img-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html": [
[
- "referrer-policy/origin/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin/attr-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html": [
[
- "referrer-policy/origin/attr-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin/attr-referrer/cross-origin/http-https/script-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html": [
[
- "referrer-policy/origin/attr-referrer/cross-origin/http-https/script-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin/attr-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html": [
[
- "referrer-policy/origin/attr-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin/attr-referrer/same-origin/http-http/a-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html": [
[
- "referrer-policy/origin/attr-referrer/same-origin/http-http/a-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin/attr-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html": [
[
- "referrer-policy/origin/attr-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin/attr-referrer/same-origin/http-http/iframe-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html": [
[
- "referrer-policy/origin/attr-referrer/same-origin/http-http/iframe-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin/attr-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html": [
[
- "referrer-policy/origin/attr-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html": [
[
- "referrer-policy/origin/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin/attr-referrer/same-origin/http-http/img-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html": [
[
- "referrer-policy/origin/attr-referrer/same-origin/http-http/img-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html": [
[
- "referrer-policy/origin/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin/attr-referrer/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html": [
[
- "referrer-policy/origin/attr-referrer/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin/attr-referrer/same-origin/http-http/script-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html": [
[
- "referrer-policy/origin/attr-referrer/same-origin/http-http/script-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin/attr-referrer/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html": [
[
- "referrer-policy/origin/attr-referrer/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin/attr-referrer/same-origin/http-https/a-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html": [
[
- "referrer-policy/origin/attr-referrer/same-origin/http-https/a-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin/attr-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html": [
[
- "referrer-policy/origin/attr-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin/attr-referrer/same-origin/http-https/iframe-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html": [
[
- "referrer-policy/origin/attr-referrer/same-origin/http-https/iframe-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html": [
[
- "referrer-policy/origin/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html": [
[
- "referrer-policy/origin/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin/attr-referrer/same-origin/http-https/img-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html": [
[
- "referrer-policy/origin/attr-referrer/same-origin/http-https/img-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html": [
[
- "referrer-policy/origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin/attr-referrer/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html": [
[
- "referrer-policy/origin/attr-referrer/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin/attr-referrer/same-origin/http-https/script-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html": [
[
- "referrer-policy/origin/attr-referrer/same-origin/http-https/script-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html": [
[
- "referrer-policy/origin/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/cross-origin/http-http/a-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html": [
[
- "referrer-policy/origin/http-rp/cross-origin/http-http/a-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html": [
[
- "referrer-policy/origin/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/cross-origin/http-http/fetch-request/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html": [
[
- "referrer-policy/origin/http-rp/cross-origin/http-http/fetch-request/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html": [
[
- "referrer-policy/origin/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html": [
[
- "referrer-policy/origin/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html": [
[
- "referrer-policy/origin/http-rp/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html": [
[
- "referrer-policy/origin/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html": [
[
- "referrer-policy/origin/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/cross-origin/http-http/img-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html": [
[
- "referrer-policy/origin/http-rp/cross-origin/http-http/img-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html": [
[
- "referrer-policy/origin/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html": [
[
- "referrer-policy/origin/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/cross-origin/http-http/script-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html": [
[
- "referrer-policy/origin/http-rp/cross-origin/http-http/script-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html": [
[
- "referrer-policy/origin/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html": [
[
- "referrer-policy/origin/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/cross-origin/http-http/xhr-request/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html": [
[
- "referrer-policy/origin/http-rp/cross-origin/http-http/xhr-request/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html": [
[
- "referrer-policy/origin/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/cross-origin/http-https/a-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html": [
[
- "referrer-policy/origin/http-rp/cross-origin/http-https/a-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html": [
[
- "referrer-policy/origin/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/cross-origin/http-https/fetch-request/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html": [
[
- "referrer-policy/origin/http-rp/cross-origin/http-https/fetch-request/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html": [
[
- "referrer-policy/origin/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html": [
[
- "referrer-policy/origin/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html": [
[
- "referrer-policy/origin/http-rp/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html": [
[
- "referrer-policy/origin/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unset/fetch/cross-http.keep-origin.http.html": [
[
- "referrer-policy/origin/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unset/fetch/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/cross-origin/http-https/img-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unset/fetch/cross-http.no-redirect.http.html": [
[
- "referrer-policy/origin/http-rp/cross-origin/http-https/img-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unset/fetch/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unset/fetch/cross-http.swap-origin.http.html": [
[
- "referrer-policy/origin/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unset/fetch/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unset/fetch/cross-https.keep-origin.http.html": [
[
- "referrer-policy/origin/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unset/fetch/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/cross-origin/http-https/script-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unset/fetch/cross-https.no-redirect.http.html": [
[
- "referrer-policy/origin/http-rp/cross-origin/http-https/script-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unset/fetch/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unset/fetch/cross-https.swap-origin.http.html": [
[
- "referrer-policy/origin/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unset/fetch/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unset/fetch/same-http.keep-origin.http.html": [
[
- "referrer-policy/origin/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unset/fetch/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/cross-origin/http-https/xhr-request/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unset/fetch/same-http.no-redirect.http.html": [
[
- "referrer-policy/origin/http-rp/cross-origin/http-https/xhr-request/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unset/fetch/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unset/fetch/same-http.swap-origin.http.html": [
[
- "referrer-policy/origin/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unset/fetch/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/same-origin/http-http/a-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unset/fetch/same-https.keep-origin.http.html": [
[
- "referrer-policy/origin/http-rp/same-origin/http-http/a-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unset/fetch/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unset/fetch/same-https.no-redirect.http.html": [
[
- "referrer-policy/origin/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unset/fetch/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/same-origin/http-http/fetch-request/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unset/fetch/same-https.swap-origin.http.html": [
[
- "referrer-policy/origin/http-rp/same-origin/http-http/fetch-request/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unset/fetch/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unset/iframe-tag/cross-http.keep-origin.http.html": [
[
- "referrer-policy/origin/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unset/iframe-tag/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unset/iframe-tag/cross-http.no-redirect.http.html": [
[
- "referrer-policy/origin/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unset/iframe-tag/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/same-origin/http-http/iframe-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unset/iframe-tag/cross-http.swap-origin.http.html": [
[
- "referrer-policy/origin/http-rp/same-origin/http-http/iframe-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unset/iframe-tag/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unset/iframe-tag/cross-https.keep-origin.http.html": [
[
- "referrer-policy/origin/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unset/iframe-tag/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unset/iframe-tag/cross-https.no-redirect.http.html": [
[
- "referrer-policy/origin/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unset/iframe-tag/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/same-origin/http-http/img-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unset/iframe-tag/cross-https.swap-origin.http.html": [
[
- "referrer-policy/origin/http-rp/same-origin/http-http/img-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unset/iframe-tag/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unset/iframe-tag/same-http.keep-origin.http.html": [
[
- "referrer-policy/origin/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unset/iframe-tag/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unset/iframe-tag/same-http.no-redirect.http.html": [
[
- "referrer-policy/origin/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unset/iframe-tag/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/same-origin/http-http/module-worker/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unset/iframe-tag/same-http.swap-origin.http.html": [
[
- "referrer-policy/origin/http-rp/same-origin/http-http/module-worker/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unset/iframe-tag/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unset/iframe-tag/same-https.keep-origin.http.html": [
[
- "referrer-policy/origin/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unset/iframe-tag/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/same-origin/http-http/script-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unset/iframe-tag/same-https.no-redirect.http.html": [
[
- "referrer-policy/origin/http-rp/same-origin/http-http/script-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unset/iframe-tag/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unset/iframe-tag/same-https.swap-origin.http.html": [
[
- "referrer-policy/origin/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unset/iframe-tag/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unset/img-tag/cross-http.keep-origin.http.html": [
[
- "referrer-policy/origin/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unset/img-tag/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/same-origin/http-http/shared-worker/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unset/img-tag/cross-http.no-redirect.http.html": [
[
- "referrer-policy/origin/http-rp/same-origin/http-http/shared-worker/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unset/img-tag/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unset/img-tag/cross-http.swap-origin.http.html": [
[
- "referrer-policy/origin/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unset/img-tag/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/same-origin/http-http/worker-request/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unset/img-tag/cross-https.keep-origin.http.html": [
[
- "referrer-policy/origin/http-rp/same-origin/http-http/worker-request/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unset/img-tag/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unset/img-tag/cross-https.no-redirect.http.html": [
[
- "referrer-policy/origin/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unset/img-tag/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/same-origin/http-http/xhr-request/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unset/img-tag/cross-https.swap-origin.http.html": [
[
- "referrer-policy/origin/http-rp/same-origin/http-http/xhr-request/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unset/img-tag/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unset/img-tag/same-http.keep-origin.http.html": [
[
- "referrer-policy/origin/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unset/img-tag/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/same-origin/http-https/a-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unset/img-tag/same-http.no-redirect.http.html": [
[
- "referrer-policy/origin/http-rp/same-origin/http-https/a-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unset/img-tag/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unset/img-tag/same-http.swap-origin.http.html": [
[
- "referrer-policy/origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unset/img-tag/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/same-origin/http-https/fetch-request/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unset/img-tag/same-https.keep-origin.http.html": [
[
- "referrer-policy/origin/http-rp/same-origin/http-https/fetch-request/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unset/img-tag/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unset/img-tag/same-https.no-redirect.http.html": [
[
- "referrer-policy/origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unset/img-tag/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unset/img-tag/same-https.swap-origin.http.html": [
[
- "referrer-policy/origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unset/img-tag/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unset/script-tag/cross-http.keep-origin.http.html": [
[
- "referrer-policy/origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unset/script-tag/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unset/script-tag/cross-http.no-redirect.http.html": [
[
- "referrer-policy/origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unset/script-tag/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unset/script-tag/cross-http.swap-origin.http.html": [
[
- "referrer-policy/origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unset/script-tag/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/same-origin/http-https/img-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unset/script-tag/cross-https.keep-origin.http.html": [
[
- "referrer-policy/origin/http-rp/same-origin/http-https/img-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unset/script-tag/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unset/script-tag/cross-https.no-redirect.http.html": [
[
- "referrer-policy/origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unset/script-tag/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unset/script-tag/cross-https.swap-origin.http.html": [
[
- "referrer-policy/origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unset/script-tag/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/same-origin/http-https/script-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unset/script-tag/same-http.keep-origin.http.html": [
[
- "referrer-policy/origin/http-rp/same-origin/http-https/script-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unset/script-tag/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unset/script-tag/same-http.no-redirect.http.html": [
[
- "referrer-policy/origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unset/script-tag/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unset/script-tag/same-http.swap-origin.http.html": [
[
- "referrer-policy/origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unset/script-tag/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/same-origin/http-https/xhr-request/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unset/script-tag/same-https.keep-origin.http.html": [
[
- "referrer-policy/origin/http-rp/same-origin/http-https/xhr-request/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unset/script-tag/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unset/script-tag/same-https.no-redirect.http.html": [
[
- "referrer-policy/origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unset/script-tag/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/cross-origin/http-http/a-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unset/script-tag/same-https.swap-origin.http.html": [
[
- "referrer-policy/origin/meta-referrer/cross-origin/http-http/a-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unset/script-tag/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/cross-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unset/sharedworker-classic/same-http.keep-origin.http.html": [
[
- "referrer-policy/origin/meta-referrer/cross-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unset/sharedworker-classic/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/cross-origin/http-http/fetch-request/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unset/sharedworker-classic/same-http.no-redirect.http.html": [
[
- "referrer-policy/origin/meta-referrer/cross-origin/http-http/fetch-request/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unset/sharedworker-classic/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/cross-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unset/worker-classic/same-http.keep-origin.http.html": [
[
- "referrer-policy/origin/meta-referrer/cross-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unset/worker-classic/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unset/worker-classic/same-http.no-redirect.http.html": [
[
- "referrer-policy/origin/meta-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unset/worker-classic/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unset/worker-module/same-http.keep-origin.http.html": [
[
- "referrer-policy/origin/meta-referrer/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unset/worker-module/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unset/worker-module/same-http.no-redirect.http.html": [
[
- "referrer-policy/origin/meta-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unset/worker-module/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unset/xhr/cross-http.keep-origin.http.html": [
[
- "referrer-policy/origin/meta-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unset/xhr/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/cross-origin/http-http/img-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unset/xhr/cross-http.no-redirect.http.html": [
[
- "referrer-policy/origin/meta-referrer/cross-origin/http-http/img-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unset/xhr/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unset/xhr/cross-http.swap-origin.http.html": [
[
- "referrer-policy/origin/meta-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unset/xhr/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unset/xhr/cross-https.keep-origin.http.html": [
[
- "referrer-policy/origin/meta-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unset/xhr/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/cross-origin/http-http/script-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unset/xhr/cross-https.no-redirect.http.html": [
[
- "referrer-policy/origin/meta-referrer/cross-origin/http-http/script-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unset/xhr/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unset/xhr/cross-https.swap-origin.http.html": [
[
- "referrer-policy/origin/meta-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unset/xhr/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/cross-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unset/xhr/same-http.keep-origin.http.html": [
[
- "referrer-policy/origin/meta-referrer/cross-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unset/xhr/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/cross-origin/http-http/xhr-request/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unset/xhr/same-http.no-redirect.http.html": [
[
- "referrer-policy/origin/meta-referrer/cross-origin/http-http/xhr-request/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unset/xhr/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/cross-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unset/xhr/same-http.swap-origin.http.html": [
[
- "referrer-policy/origin/meta-referrer/cross-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unset/xhr/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/cross-origin/http-https/a-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unset/xhr/same-https.keep-origin.http.html": [
[
- "referrer-policy/origin/meta-referrer/cross-origin/http-https/a-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unset/xhr/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/cross-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unset/xhr/same-https.no-redirect.http.html": [
[
- "referrer-policy/origin/meta-referrer/cross-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unset/xhr/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/cross-origin/http-https/fetch-request/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.http-rp/unset/xhr/same-https.swap-origin.http.html": [
[
- "referrer-policy/origin/meta-referrer/cross-origin/http-https/fetch-request/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.http-rp/unset/xhr/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/cross-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html": [
[
- "referrer-policy/origin/meta-referrer/cross-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html": [
[
- "referrer-policy/origin/meta-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html": [
[
- "referrer-policy/origin/meta-referrer/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html": [
[
- "referrer-policy/origin/meta-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html": [
[
- "referrer-policy/origin/meta-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/cross-origin/http-https/img-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html": [
[
- "referrer-policy/origin/meta-referrer/cross-origin/http-https/img-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html": [
[
- "referrer-policy/origin/meta-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html": [
[
- "referrer-policy/origin/meta-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/cross-origin/http-https/script-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html": [
[
- "referrer-policy/origin/meta-referrer/cross-origin/http-https/script-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html": [
[
- "referrer-policy/origin/meta-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/cross-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html": [
[
- "referrer-policy/origin/meta-referrer/cross-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/cross-origin/http-https/xhr-request/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html": [
[
- "referrer-policy/origin/meta-referrer/cross-origin/http-https/xhr-request/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/cross-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html": [
[
- "referrer-policy/origin/meta-referrer/cross-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/same-origin/http-http/a-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html": [
[
- "referrer-policy/origin/meta-referrer/same-origin/http-http/a-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/same-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html": [
[
- "referrer-policy/origin/meta-referrer/same-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/same-origin/http-http/fetch-request/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html": [
[
- "referrer-policy/origin/meta-referrer/same-origin/http-http/fetch-request/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/same-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html": [
[
- "referrer-policy/origin/meta-referrer/same-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html": [
[
- "referrer-policy/origin/meta-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/same-origin/http-http/iframe-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html": [
[
- "referrer-policy/origin/meta-referrer/same-origin/http-http/iframe-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html": [
[
- "referrer-policy/origin/meta-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html": [
[
- "referrer-policy/origin/meta-referrer/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/same-origin/http-http/img-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html": [
[
- "referrer-policy/origin/meta-referrer/same-origin/http-http/img-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html": [
[
- "referrer-policy/origin/meta-referrer/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/same-origin/http-http/module-worker/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html": [
[
- "referrer-policy/origin/meta-referrer/same-origin/http-http/module-worker/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/same-origin/http-http/module-worker/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html": [
[
- "referrer-policy/origin/meta-referrer/same-origin/http-http/module-worker/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html": [
[
- "referrer-policy/origin/meta-referrer/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/same-origin/http-http/script-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html": [
[
- "referrer-policy/origin/meta-referrer/same-origin/http-http/script-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html": [
[
- "referrer-policy/origin/meta-referrer/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/same-origin/http-http/shared-worker/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html": [
[
- "referrer-policy/origin/meta-referrer/same-origin/http-http/shared-worker/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/same-origin/http-http/shared-worker/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html": [
[
- "referrer-policy/origin/meta-referrer/same-origin/http-http/shared-worker/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/same-origin/http-http/worker-request/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html": [
[
- "referrer-policy/origin/meta-referrer/same-origin/http-http/worker-request/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/same-origin/http-http/worker-request/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html": [
[
- "referrer-policy/origin/meta-referrer/same-origin/http-http/worker-request/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/same-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html": [
[
- "referrer-policy/origin/meta-referrer/same-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/same-origin/http-http/xhr-request/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html": [
[
- "referrer-policy/origin/meta-referrer/same-origin/http-http/xhr-request/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/same-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html": [
[
- "referrer-policy/origin/meta-referrer/same-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/same-origin/http-https/a-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html": [
[
- "referrer-policy/origin/meta-referrer/same-origin/http-https/a-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html": [
[
- "referrer-policy/origin/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/same-origin/http-https/fetch-request/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html": [
[
- "referrer-policy/origin/meta-referrer/same-origin/http-https/fetch-request/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html": [
[
- "referrer-policy/origin/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html": [
[
- "referrer-policy/origin/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html": [
[
- "referrer-policy/origin/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html": [
[
- "referrer-policy/origin/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html": [
[
- "referrer-policy/origin/meta-referrer/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/same-origin/http-https/img-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html": [
[
- "referrer-policy/origin/meta-referrer/same-origin/http-https/img-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html": [
[
- "referrer-policy/origin/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html": [
[
- "referrer-policy/origin/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/same-origin/http-https/script-tag/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html": [
[
- "referrer-policy/origin/meta-referrer/same-origin/http-https/script-tag/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html": [
[
- "referrer-policy/origin/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html": [
[
- "referrer-policy/origin/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/same-origin/http-https/xhr-request/no-redirect/generic.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html": [
[
- "referrer-policy/origin/meta-referrer/same-origin/http-https/xhr-request/no-redirect/generic.http.html",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/origin/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html": [
[
- "referrer-policy/origin/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/attr-referrer/cross-origin/http-http/a-tag/no-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html": [
[
- "referrer-policy/same-origin/attr-referrer/cross-origin/http-http/a-tag/no-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/attr-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html": [
[
- "referrer-policy/same-origin/attr-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/same-origin/attr-referrer/cross-origin/http-http/iframe-tag/no-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html": [
[
- "referrer-policy/same-origin/attr-referrer/cross-origin/http-http/iframe-tag/no-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/attr-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer/fetch/cross-http.keep-origin.http.html": [
[
- "referrer-policy/same-origin/attr-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/no-referrer/fetch/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer/fetch/cross-http.no-redirect.http.html": [
[
- "referrer-policy/same-origin/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/no-referrer/fetch/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/same-origin/attr-referrer/cross-origin/http-http/img-tag/no-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer/fetch/cross-http.swap-origin.http.html": [
[
- "referrer-policy/same-origin/attr-referrer/cross-origin/http-http/img-tag/no-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/no-referrer/fetch/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer/fetch/cross-https.keep-origin.http.html": [
[
- "referrer-policy/same-origin/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/no-referrer/fetch/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/attr-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer/fetch/cross-https.no-redirect.http.html": [
[
- "referrer-policy/same-origin/attr-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/no-referrer/fetch/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/same-origin/attr-referrer/cross-origin/http-http/script-tag/no-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer/fetch/cross-https.swap-origin.http.html": [
[
- "referrer-policy/same-origin/attr-referrer/cross-origin/http-http/script-tag/no-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/no-referrer/fetch/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/attr-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer/fetch/same-http.keep-origin.http.html": [
[
- "referrer-policy/same-origin/attr-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/no-referrer/fetch/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/attr-referrer/cross-origin/http-https/a-tag/no-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer/fetch/same-http.no-redirect.http.html": [
[
- "referrer-policy/same-origin/attr-referrer/cross-origin/http-https/a-tag/no-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/no-referrer/fetch/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/same-origin/attr-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer/fetch/same-http.swap-origin.http.html": [
[
- "referrer-policy/same-origin/attr-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/no-referrer/fetch/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/attr-referrer/cross-origin/http-https/iframe-tag/no-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer/fetch/same-https.keep-origin.http.html": [
[
- "referrer-policy/same-origin/attr-referrer/cross-origin/http-https/iframe-tag/no-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/no-referrer/fetch/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/attr-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer/fetch/same-https.no-redirect.http.html": [
[
- "referrer-policy/same-origin/attr-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/no-referrer/fetch/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/same-origin/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer/fetch/same-https.swap-origin.http.html": [
[
- "referrer-policy/same-origin/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/no-referrer/fetch/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/attr-referrer/cross-origin/http-https/img-tag/no-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer/iframe-tag/cross-http.keep-origin.http.html": [
[
- "referrer-policy/same-origin/attr-referrer/cross-origin/http-https/img-tag/no-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/no-referrer/iframe-tag/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer/iframe-tag/cross-http.no-redirect.http.html": [
[
- "referrer-policy/same-origin/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/no-referrer/iframe-tag/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/same-origin/attr-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer/iframe-tag/cross-http.swap-origin.http.html": [
[
- "referrer-policy/same-origin/attr-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/no-referrer/iframe-tag/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/attr-referrer/cross-origin/http-https/script-tag/no-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer/iframe-tag/cross-https.keep-origin.http.html": [
[
- "referrer-policy/same-origin/attr-referrer/cross-origin/http-https/script-tag/no-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/no-referrer/iframe-tag/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/attr-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer/iframe-tag/cross-https.no-redirect.http.html": [
[
- "referrer-policy/same-origin/attr-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/no-referrer/iframe-tag/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/same-origin/attr-referrer/same-origin/http-http/a-tag/no-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer/iframe-tag/cross-https.swap-origin.http.html": [
[
- "referrer-policy/same-origin/attr-referrer/same-origin/http-http/a-tag/no-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.meta/no-referrer/iframe-tag/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/attr-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer/iframe-tag/same-http.keep-origin.http.html": [
[
- "referrer-policy/same-origin/attr-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.meta/no-referrer/iframe-tag/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/attr-referrer/same-origin/http-http/iframe-tag/no-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer/iframe-tag/same-http.no-redirect.http.html": [
[
- "referrer-policy/same-origin/attr-referrer/same-origin/http-http/iframe-tag/no-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.meta/no-referrer/iframe-tag/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/same-origin/attr-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer/iframe-tag/same-http.swap-origin.http.html": [
[
- "referrer-policy/same-origin/attr-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.meta/no-referrer/iframe-tag/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer/iframe-tag/same-https.keep-origin.http.html": [
[
- "referrer-policy/same-origin/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.meta/no-referrer/iframe-tag/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/attr-referrer/same-origin/http-http/img-tag/no-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer/iframe-tag/same-https.no-redirect.http.html": [
[
- "referrer-policy/same-origin/attr-referrer/same-origin/http-http/img-tag/no-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.meta/no-referrer/iframe-tag/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/same-origin/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer/iframe-tag/same-https.swap-origin.http.html": [
[
- "referrer-policy/same-origin/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.meta/no-referrer/iframe-tag/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/attr-referrer/same-origin/http-http/script-tag/keep-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer/script-tag/cross-http.keep-origin.http.html": [
[
- "referrer-policy/same-origin/attr-referrer/same-origin/http-http/script-tag/keep-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.meta/no-referrer/script-tag/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/attr-referrer/same-origin/http-http/script-tag/no-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer/script-tag/cross-http.no-redirect.http.html": [
[
- "referrer-policy/same-origin/attr-referrer/same-origin/http-http/script-tag/no-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.meta/no-referrer/script-tag/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/same-origin/attr-referrer/same-origin/http-http/script-tag/swap-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer/script-tag/cross-http.swap-origin.http.html": [
[
- "referrer-policy/same-origin/attr-referrer/same-origin/http-http/script-tag/swap-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.meta/no-referrer/script-tag/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer/script-tag/cross-https.keep-origin.http.html": [
[
- "referrer-policy/same-origin/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.meta/no-referrer/script-tag/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer/script-tag/cross-https.no-redirect.http.html": [
[
- "referrer-policy/same-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.meta/no-referrer/script-tag/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/same-origin/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer/script-tag/cross-https.swap-origin.http.html": [
[
- "referrer-policy/same-origin/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.meta/no-referrer/script-tag/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/a-tag/no-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer/script-tag/same-http.keep-origin.http.html": [
[
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/a-tag/no-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/no-referrer/script-tag/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer/script-tag/same-http.no-redirect.http.html": [
[
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/no-referrer/script-tag/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/no-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer/script-tag/same-http.swap-origin.http.html": [
[
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/no-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/no-referrer/script-tag/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer/script-tag/same-https.keep-origin.http.html": [
[
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/no-referrer/script-tag/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer/script-tag/same-https.no-redirect.http.html": [
[
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/no-referrer/script-tag/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/no-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer/script-tag/same-https.swap-origin.http.html": [
[
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/no-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/no-referrer/script-tag/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer/sharedworker-classic/same-http.keep-origin.http.html": [
[
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/no-referrer/sharedworker-classic/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer/sharedworker-classic/same-http.no-redirect.http.html": [
[
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/no-referrer/sharedworker-classic/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/no-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer/worker-classic/same-http.keep-origin.http.html": [
[
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/no-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/no-referrer/worker-classic/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer/worker-classic/same-http.no-redirect.http.html": [
[
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/no-referrer/worker-classic/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer/worker-module/same-http.keep-origin.http.html": [
[
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/no-referrer/worker-module/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/no-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer/worker-module/same-http.no-redirect.http.html": [
[
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/no-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/no-referrer/worker-module/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer/xhr/cross-http.keep-origin.http.html": [
[
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/no-referrer/xhr/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer/xhr/cross-http.no-redirect.http.html": [
[
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/no-referrer/xhr/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/no-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer/xhr/cross-http.swap-origin.http.html": [
[
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/no-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/no-referrer/xhr/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer/xhr/cross-https.keep-origin.http.html": [
[
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/no-referrer/xhr/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/a-tag/no-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer/xhr/cross-https.no-redirect.http.html": [
[
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/a-tag/no-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/no-referrer/xhr/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer/xhr/cross-https.swap-origin.http.html": [
[
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/no-referrer/xhr/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/no-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer/xhr/same-http.keep-origin.http.html": [
[
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/no-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/no-referrer/xhr/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer/xhr/same-http.no-redirect.http.html": [
[
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/no-referrer/xhr/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer/xhr/same-http.swap-origin.http.html": [
[
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/no-referrer/xhr/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/no-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer/xhr/same-https.keep-origin.http.html": [
[
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/no-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/no-referrer/xhr/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer/xhr/same-https.no-redirect.http.html": [
[
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/no-referrer/xhr/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/no-referrer/xhr/same-https.swap-origin.http.html": [
[
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/no-referrer/xhr/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/no-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html": [
[
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/no-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html": [
[
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html": [
[
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/no-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html": [
[
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/no-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html": [
[
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html": [
[
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/no-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/same-http.keep-origin.http.html": [
[
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/no-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/same-http.no-redirect.http.html": [
[
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/a-tag/no-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/same-http.swap-origin.http.html": [
[
- "referrer-policy/same-origin/http-rp/same-origin/http-http/a-tag/no-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/same-https.keep-origin.http.html": [
[
- "referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/no-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/same-https.no-redirect.http.html": [
[
- "referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/no-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/same-https.swap-origin.http.html": [
[
- "referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html": [
[
- "referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/no-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html": [
[
- "referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/no-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html": [
[
- "referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html": [
[
- "referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/no-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html": [
[
- "referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/no-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html": [
[
- "referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html": [
[
- "referrer-policy/same-origin/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/module-worker/no-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html": [
[
- "referrer-policy/same-origin/http-rp/same-origin/http-http/module-worker/no-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html": [
[
- "referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/no-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html": [
[
- "referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/no-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html": [
[
- "referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html": [
[
- "referrer-policy/same-origin/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/shared-worker/no-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html": [
[
- "referrer-policy/same-origin/http-rp/same-origin/http-http/shared-worker/no-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html": [
[
- "referrer-policy/same-origin/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/worker-request/no-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html": [
[
- "referrer-policy/same-origin/http-rp/same-origin/http-http/worker-request/no-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html": [
[
- "referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/no-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html": [
[
- "referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/no-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html": [
[
- "referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html": [
[
- "referrer-policy/same-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html": [
[
- "referrer-policy/same-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/same-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/same-http.swap-origin.http.html": [
[
- "referrer-policy/same-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/same-https.keep-origin.http.html": [
[
- "referrer-policy/same-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/same-https.no-redirect.http.html": [
[
- "referrer-policy/same-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-http/a-tag/no-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/same-https.swap-origin.http.html": [
[
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-http/a-tag/no-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-http/fetch-request/keep-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html": [
[
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-http/fetch-request/keep-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-http/fetch-request/no-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html": [
[
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-http/fetch-request/no-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-http/fetch-request/swap-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html": [
[
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-http/fetch-request/swap-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html": [
[
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-http/iframe-tag/no-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html": [
[
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-http/iframe-tag/no-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html": [
[
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/cross-http.keep-origin.http.html": [
[
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-http/img-tag/no-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/cross-http.no-redirect.http.html": [
[
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-http/img-tag/no-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/cross-http.swap-origin.http.html": [
[
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/cross-https.keep-origin.http.html": [
[
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-http/script-tag/no-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/cross-https.no-redirect.http.html": [
[
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-http/script-tag/no-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/cross-https.swap-origin.http.html": [
[
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-http/xhr-request/keep-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/same-http.keep-origin.http.html": [
[
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-http/xhr-request/keep-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-http/xhr-request/no-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/same-http.no-redirect.http.html": [
[
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-http/xhr-request/no-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-http/xhr-request/swap-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/same-http.swap-origin.http.html": [
[
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-http/xhr-request/swap-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-https/a-tag/no-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/same-https.keep-origin.http.html": [
[
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-https/a-tag/no-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-https/fetch-request/keep-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/same-https.no-redirect.http.html": [
[
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-https/fetch-request/keep-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-https/fetch-request/no-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/same-https.swap-origin.http.html": [
[
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-https/fetch-request/no-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-https/fetch-request/swap-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/origin/fetch/cross-http.keep-origin.http.html": [
[
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-https/fetch-request/swap-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/origin/fetch/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/origin/fetch/cross-http.no-redirect.http.html": [
[
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/origin/fetch/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-https/iframe-tag/no-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/origin/fetch/cross-http.swap-origin.http.html": [
[
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-https/iframe-tag/no-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/origin/fetch/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/origin/fetch/cross-https.keep-origin.http.html": [
[
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/origin/fetch/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/origin/fetch/cross-https.no-redirect.http.html": [
[
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/origin/fetch/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-https/img-tag/no-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/origin/fetch/cross-https.swap-origin.http.html": [
[
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-https/img-tag/no-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/origin/fetch/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/origin/fetch/same-http.keep-origin.http.html": [
[
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/origin/fetch/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/origin/fetch/same-http.no-redirect.http.html": [
[
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/origin/fetch/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-https/script-tag/no-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/origin/fetch/same-http.swap-origin.http.html": [
[
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-https/script-tag/no-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/origin/fetch/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/origin/fetch/same-https.keep-origin.http.html": [
[
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/origin/fetch/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-https/xhr-request/keep-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/origin/fetch/same-https.no-redirect.http.html": [
[
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-https/xhr-request/keep-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/origin/fetch/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-https/xhr-request/no-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/origin/fetch/same-https.swap-origin.http.html": [
[
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-https/xhr-request/no-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/origin/fetch/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-https/xhr-request/swap-origin-redirect/cross-origin.http.html": [
+ "referrer-policy/gen/top.meta/origin/iframe-tag/cross-http.keep-origin.http.html": [
[
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-https/xhr-request/swap-origin-redirect/cross-origin.http.html",
+ "referrer-policy/gen/top.meta/origin/iframe-tag/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/meta-referrer/same-origin/http-http/a-tag/no-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.meta/origin/iframe-tag/cross-http.no-redirect.http.html": [
[
- "referrer-policy/same-origin/meta-referrer/same-origin/http-http/a-tag/no-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.meta/origin/iframe-tag/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/same-origin/meta-referrer/same-origin/http-http/fetch-request/keep-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.meta/origin/iframe-tag/cross-http.swap-origin.http.html": [
[
- "referrer-policy/same-origin/meta-referrer/same-origin/http-http/fetch-request/keep-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.meta/origin/iframe-tag/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/meta-referrer/same-origin/http-http/fetch-request/no-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.meta/origin/iframe-tag/cross-https.keep-origin.http.html": [
[
- "referrer-policy/same-origin/meta-referrer/same-origin/http-http/fetch-request/no-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.meta/origin/iframe-tag/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/meta-referrer/same-origin/http-http/fetch-request/swap-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.meta/origin/iframe-tag/cross-https.no-redirect.http.html": [
[
- "referrer-policy/same-origin/meta-referrer/same-origin/http-http/fetch-request/swap-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.meta/origin/iframe-tag/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/same-origin/meta-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.meta/origin/iframe-tag/cross-https.swap-origin.http.html": [
[
- "referrer-policy/same-origin/meta-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.meta/origin/iframe-tag/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/meta-referrer/same-origin/http-http/iframe-tag/no-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.meta/origin/iframe-tag/same-http.keep-origin.http.html": [
[
- "referrer-policy/same-origin/meta-referrer/same-origin/http-http/iframe-tag/no-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.meta/origin/iframe-tag/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/meta-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.meta/origin/iframe-tag/same-http.no-redirect.http.html": [
[
- "referrer-policy/same-origin/meta-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.meta/origin/iframe-tag/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/same-origin/meta-referrer/same-origin/http-http/img-tag/keep-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.meta/origin/iframe-tag/same-http.swap-origin.http.html": [
[
- "referrer-policy/same-origin/meta-referrer/same-origin/http-http/img-tag/keep-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.meta/origin/iframe-tag/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/meta-referrer/same-origin/http-http/img-tag/no-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.meta/origin/iframe-tag/same-https.keep-origin.http.html": [
[
- "referrer-policy/same-origin/meta-referrer/same-origin/http-http/img-tag/no-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.meta/origin/iframe-tag/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/meta-referrer/same-origin/http-http/img-tag/swap-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.meta/origin/iframe-tag/same-https.no-redirect.http.html": [
[
- "referrer-policy/same-origin/meta-referrer/same-origin/http-http/img-tag/swap-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.meta/origin/iframe-tag/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/same-origin/meta-referrer/same-origin/http-http/module-worker/keep-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.meta/origin/iframe-tag/same-https.swap-origin.http.html": [
[
- "referrer-policy/same-origin/meta-referrer/same-origin/http-http/module-worker/keep-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.meta/origin/iframe-tag/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/meta-referrer/same-origin/http-http/module-worker/no-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.meta/origin/script-tag/cross-http.keep-origin.http.html": [
[
- "referrer-policy/same-origin/meta-referrer/same-origin/http-http/module-worker/no-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.meta/origin/script-tag/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/meta-referrer/same-origin/http-http/script-tag/keep-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.meta/origin/script-tag/cross-http.no-redirect.http.html": [
[
- "referrer-policy/same-origin/meta-referrer/same-origin/http-http/script-tag/keep-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.meta/origin/script-tag/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/same-origin/meta-referrer/same-origin/http-http/script-tag/no-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.meta/origin/script-tag/cross-http.swap-origin.http.html": [
[
- "referrer-policy/same-origin/meta-referrer/same-origin/http-http/script-tag/no-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.meta/origin/script-tag/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/meta-referrer/same-origin/http-http/script-tag/swap-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.meta/origin/script-tag/cross-https.keep-origin.http.html": [
[
- "referrer-policy/same-origin/meta-referrer/same-origin/http-http/script-tag/swap-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.meta/origin/script-tag/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/meta-referrer/same-origin/http-http/shared-worker/keep-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.meta/origin/script-tag/cross-https.no-redirect.http.html": [
[
- "referrer-policy/same-origin/meta-referrer/same-origin/http-http/shared-worker/keep-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.meta/origin/script-tag/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/same-origin/meta-referrer/same-origin/http-http/shared-worker/no-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.meta/origin/script-tag/cross-https.swap-origin.http.html": [
[
- "referrer-policy/same-origin/meta-referrer/same-origin/http-http/shared-worker/no-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.meta/origin/script-tag/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/meta-referrer/same-origin/http-http/worker-request/keep-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.meta/origin/script-tag/same-http.keep-origin.http.html": [
[
- "referrer-policy/same-origin/meta-referrer/same-origin/http-http/worker-request/keep-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.meta/origin/script-tag/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/meta-referrer/same-origin/http-http/worker-request/no-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.meta/origin/script-tag/same-http.no-redirect.http.html": [
[
- "referrer-policy/same-origin/meta-referrer/same-origin/http-http/worker-request/no-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.meta/origin/script-tag/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/same-origin/meta-referrer/same-origin/http-http/xhr-request/keep-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.meta/origin/script-tag/same-http.swap-origin.http.html": [
[
- "referrer-policy/same-origin/meta-referrer/same-origin/http-http/xhr-request/keep-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.meta/origin/script-tag/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/meta-referrer/same-origin/http-http/xhr-request/no-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.meta/origin/script-tag/same-https.keep-origin.http.html": [
[
- "referrer-policy/same-origin/meta-referrer/same-origin/http-http/xhr-request/no-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.meta/origin/script-tag/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/meta-referrer/same-origin/http-http/xhr-request/swap-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.meta/origin/script-tag/same-https.no-redirect.http.html": [
[
- "referrer-policy/same-origin/meta-referrer/same-origin/http-http/xhr-request/swap-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.meta/origin/script-tag/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/same-origin/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.meta/origin/script-tag/same-https.swap-origin.http.html": [
[
- "referrer-policy/same-origin/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.meta/origin/script-tag/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.meta/origin/sharedworker-classic/same-http.keep-origin.http.html": [
[
- "referrer-policy/same-origin/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.meta/origin/sharedworker-classic/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.meta/origin/sharedworker-classic/same-http.no-redirect.http.html": [
[
- "referrer-policy/same-origin/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.meta/origin/sharedworker-classic/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/same-origin/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.meta/origin/worker-classic/same-http.keep-origin.http.html": [
[
- "referrer-policy/same-origin/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.meta/origin/worker-classic/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/same-origin/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-insecure.http.html": [
+ "referrer-policy/gen/top.meta/origin/worker-classic/same-http.no-redirect.http.html": [
[
- "referrer-policy/same-origin/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-insecure.http.html",
+ "referrer-policy/gen/top.meta/origin/worker-classic/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/a-tag/no-redirect/cross-insecure.http.html": [
+ "referrer-policy/gen/top.meta/origin/worker-module/same-http.keep-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/a-tag/no-redirect/cross-insecure.http.html",
+ "referrer-policy/gen/top.meta/origin/worker-module/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-insecure.http.html": [
+ "referrer-policy/gen/top.meta/origin/worker-module/same-http.no-redirect.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-insecure.http.html",
+ "referrer-policy/gen/top.meta/origin/worker-module/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/iframe-tag/no-redirect/cross-insecure.http.html": [
+ "referrer-policy/gen/top.meta/origin/xhr/cross-http.keep-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/iframe-tag/no-redirect/cross-insecure.http.html",
+ "referrer-policy/gen/top.meta/origin/xhr/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-insecure.http.html": [
+ "referrer-policy/gen/top.meta/origin/xhr/cross-http.no-redirect.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-insecure.http.html",
+ "referrer-policy/gen/top.meta/origin/xhr/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/cross-insecure.http.html": [
+ "referrer-policy/gen/top.meta/origin/xhr/cross-http.swap-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/cross-insecure.http.html",
+ "referrer-policy/gen/top.meta/origin/xhr/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/no-redirect/cross-insecure.http.html": [
+ "referrer-policy/gen/top.meta/origin/xhr/cross-https.keep-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/no-redirect/cross-insecure.http.html",
+ "referrer-policy/gen/top.meta/origin/xhr/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/cross-insecure.http.html": [
+ "referrer-policy/gen/top.meta/origin/xhr/cross-https.no-redirect.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/cross-insecure.http.html",
+ "referrer-policy/gen/top.meta/origin/xhr/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/cross-insecure.http.html": [
+ "referrer-policy/gen/top.meta/origin/xhr/cross-https.swap-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/cross-insecure.http.html",
+ "referrer-policy/gen/top.meta/origin/xhr/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/script-tag/no-redirect/cross-insecure.http.html": [
+ "referrer-policy/gen/top.meta/origin/xhr/same-http.keep-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/script-tag/no-redirect/cross-insecure.http.html",
+ "referrer-policy/gen/top.meta/origin/xhr/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/cross-insecure.http.html": [
+ "referrer-policy/gen/top.meta/origin/xhr/same-http.no-redirect.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/cross-insecure.http.html",
+ "referrer-policy/gen/top.meta/origin/xhr/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/origin/xhr/same-http.swap-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/origin/xhr/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/origin/xhr/same-https.keep-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/origin/xhr/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/origin/xhr/same-https.no-redirect.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/origin/xhr/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/origin/xhr/same-https.swap-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/origin/xhr/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/same-origin/fetch/cross-http.keep-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/same-origin/fetch/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/same-origin/fetch/cross-http.no-redirect.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/same-origin/fetch/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/same-origin/fetch/cross-http.swap-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/same-origin/fetch/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/same-origin/fetch/cross-https.keep-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/same-origin/fetch/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/same-origin/fetch/cross-https.no-redirect.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/same-origin/fetch/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/same-origin/fetch/cross-https.swap-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/same-origin/fetch/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/a-tag/no-redirect/same-insecure.http.html": [
+ "referrer-policy/gen/top.meta/same-origin/fetch/same-http.keep-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/a-tag/no-redirect/same-insecure.http.html",
+ "referrer-policy/gen/top.meta/same-origin/fetch/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/same-insecure.http.html": [
+ "referrer-policy/gen/top.meta/same-origin/fetch/same-http.no-redirect.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/same-insecure.http.html",
+ "referrer-policy/gen/top.meta/same-origin/fetch/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/iframe-tag/no-redirect/same-insecure.http.html": [
+ "referrer-policy/gen/top.meta/same-origin/fetch/same-http.swap-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/iframe-tag/no-redirect/same-insecure.http.html",
+ "referrer-policy/gen/top.meta/same-origin/fetch/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/same-insecure.http.html": [
+ "referrer-policy/gen/top.meta/same-origin/fetch/same-https.swap-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/same-insecure.http.html",
+ "referrer-policy/gen/top.meta/same-origin/fetch/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/same-insecure.http.html": [
+ "referrer-policy/gen/top.meta/same-origin/iframe-tag/cross-http.keep-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/same-insecure.http.html",
+ "referrer-policy/gen/top.meta/same-origin/iframe-tag/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/no-redirect/same-insecure.http.html": [
+ "referrer-policy/gen/top.meta/same-origin/iframe-tag/cross-http.no-redirect.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/no-redirect/same-insecure.http.html",
+ "referrer-policy/gen/top.meta/same-origin/iframe-tag/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/same-insecure.http.html": [
+ "referrer-policy/gen/top.meta/same-origin/iframe-tag/cross-http.swap-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/same-insecure.http.html",
+ "referrer-policy/gen/top.meta/same-origin/iframe-tag/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/script-tag/keep-origin-redirect/same-insecure.http.html": [
+ "referrer-policy/gen/top.meta/same-origin/iframe-tag/cross-https.keep-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/script-tag/keep-origin-redirect/same-insecure.http.html",
+ "referrer-policy/gen/top.meta/same-origin/iframe-tag/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/script-tag/no-redirect/same-insecure.http.html": [
+ "referrer-policy/gen/top.meta/same-origin/iframe-tag/cross-https.no-redirect.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/script-tag/no-redirect/same-insecure.http.html",
+ "referrer-policy/gen/top.meta/same-origin/iframe-tag/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/script-tag/swap-origin-redirect/same-insecure.http.html": [
+ "referrer-policy/gen/top.meta/same-origin/iframe-tag/cross-https.swap-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/script-tag/swap-origin-redirect/same-insecure.http.html",
+ "referrer-policy/gen/top.meta/same-origin/iframe-tag/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/same-origin/iframe-tag/same-http.keep-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/same-origin/iframe-tag/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/same-origin/iframe-tag/same-http.no-redirect.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/same-origin/iframe-tag/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/same-origin/iframe-tag/same-http.swap-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/same-origin/iframe-tag/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/same-origin/iframe-tag/same-https.swap-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/same-origin/iframe-tag/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/same-origin/script-tag/cross-http.keep-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/same-origin/script-tag/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/same-origin/script-tag/cross-http.no-redirect.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/same-origin/script-tag/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/same-origin/script-tag/cross-http.swap-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/same-origin/script-tag/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/same-origin/script-tag/cross-https.keep-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/same-origin/script-tag/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/same-origin/script-tag/cross-https.no-redirect.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/same-origin/script-tag/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/same-origin/script-tag/cross-https.swap-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/same-origin/script-tag/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/a-tag/no-redirect/cross-insecure.http.html": [
+ "referrer-policy/gen/top.meta/same-origin/script-tag/same-http.keep-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/a-tag/no-redirect/cross-insecure.http.html",
+ "referrer-policy/gen/top.meta/same-origin/script-tag/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/cross-insecure.http.html": [
+ "referrer-policy/gen/top.meta/same-origin/script-tag/same-http.no-redirect.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/cross-insecure.http.html",
+ "referrer-policy/gen/top.meta/same-origin/script-tag/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/no-redirect/cross-insecure.http.html": [
+ "referrer-policy/gen/top.meta/same-origin/script-tag/same-http.swap-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/no-redirect/cross-insecure.http.html",
+ "referrer-policy/gen/top.meta/same-origin/script-tag/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/cross-insecure.http.html": [
+ "referrer-policy/gen/top.meta/same-origin/script-tag/same-https.swap-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/cross-insecure.http.html",
+ "referrer-policy/gen/top.meta/same-origin/script-tag/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-insecure.http.html": [
+ "referrer-policy/gen/top.meta/same-origin/sharedworker-classic/same-http.keep-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-insecure.http.html",
+ "referrer-policy/gen/top.meta/same-origin/sharedworker-classic/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/no-redirect/cross-insecure.http.html": [
+ "referrer-policy/gen/top.meta/same-origin/sharedworker-classic/same-http.no-redirect.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/no-redirect/cross-insecure.http.html",
+ "referrer-policy/gen/top.meta/same-origin/sharedworker-classic/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-insecure.http.html": [
+ "referrer-policy/gen/top.meta/same-origin/worker-classic/same-http.keep-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-insecure.http.html",
+ "referrer-policy/gen/top.meta/same-origin/worker-classic/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/cross-insecure.http.html": [
+ "referrer-policy/gen/top.meta/same-origin/worker-classic/same-http.no-redirect.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/cross-insecure.http.html",
+ "referrer-policy/gen/top.meta/same-origin/worker-classic/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/no-redirect/cross-insecure.http.html": [
+ "referrer-policy/gen/top.meta/same-origin/worker-module/same-http.keep-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/no-redirect/cross-insecure.http.html",
+ "referrer-policy/gen/top.meta/same-origin/worker-module/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/cross-insecure.http.html": [
+ "referrer-policy/gen/top.meta/same-origin/worker-module/same-http.no-redirect.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/cross-insecure.http.html",
+ "referrer-policy/gen/top.meta/same-origin/worker-module/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/cross-insecure.http.html": [
+ "referrer-policy/gen/top.meta/same-origin/xhr/cross-http.keep-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/cross-insecure.http.html",
+ "referrer-policy/gen/top.meta/same-origin/xhr/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/no-redirect/cross-insecure.http.html": [
+ "referrer-policy/gen/top.meta/same-origin/xhr/cross-http.no-redirect.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/no-redirect/cross-insecure.http.html",
+ "referrer-policy/gen/top.meta/same-origin/xhr/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/cross-insecure.http.html": [
+ "referrer-policy/gen/top.meta/same-origin/xhr/cross-http.swap-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/cross-insecure.http.html",
+ "referrer-policy/gen/top.meta/same-origin/xhr/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/cross-insecure.http.html": [
+ "referrer-policy/gen/top.meta/same-origin/xhr/cross-https.keep-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/cross-insecure.http.html",
+ "referrer-policy/gen/top.meta/same-origin/xhr/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/no-redirect/cross-insecure.http.html": [
+ "referrer-policy/gen/top.meta/same-origin/xhr/cross-https.no-redirect.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/no-redirect/cross-insecure.http.html",
+ "referrer-policy/gen/top.meta/same-origin/xhr/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/cross-insecure.http.html": [
+ "referrer-policy/gen/top.meta/same-origin/xhr/cross-https.swap-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/cross-insecure.http.html",
+ "referrer-policy/gen/top.meta/same-origin/xhr/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/same-origin/xhr/same-http.keep-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/same-origin/xhr/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/same-origin/xhr/same-http.no-redirect.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/same-origin/xhr/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/same-origin/xhr/same-http.swap-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/same-origin/xhr/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/same-origin/xhr/same-https.swap-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/same-origin/xhr/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/a-tag/no-redirect/same-insecure.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/a-tag/no-redirect/same-insecure.http.html",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/same-insecure.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/same-insecure.http.html",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/no-redirect/same-insecure.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/no-redirect/same-insecure.http.html",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/same-insecure.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/same-insecure.http.html",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/same-insecure.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/same-insecure.http.html",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/no-redirect/same-insecure.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/no-redirect/same-insecure.http.html",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/same-insecure.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/same-insecure.http.html",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/same-insecure.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/same-insecure.http.html",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/no-redirect/same-insecure.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/no-redirect/same-insecure.http.html",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/same-insecure.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/same-insecure.http.html",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/same-insecure.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/same-insecure.http.html",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/module-worker/no-redirect/same-insecure.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/module-worker/no-redirect/same-insecure.http.html",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/same-insecure.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/same-insecure.http.html",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/no-redirect/same-insecure.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/no-redirect/same-insecure.http.html",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/same-insecure.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/same-insecure.http.html",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/same-insecure.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/same-insecure.http.html",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/shared-worker/no-redirect/same-insecure.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/shared-worker/no-redirect/same-insecure.http.html",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/same-insecure.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/same-insecure.http.html",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/worker-request/no-redirect/same-insecure.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/worker-request/no-redirect/same-insecure.http.html",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/same-insecure.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/same-insecure.http.html",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/no-redirect/same-insecure.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.swap-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/no-redirect/same-insecure.http.html",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/same-insecure.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-https.keep-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/same-insecure.http.html",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-https.no-redirect.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-https.swap-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/cross-http.keep-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/cross-http.no-redirect.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/cross-http.swap-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/cross-https.keep-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/cross-https.no-redirect.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/cross-https.swap-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/a-tag/no-redirect/cross-insecure.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.swap-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/a-tag/no-redirect/cross-insecure.http.html",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/fetch-request/keep-origin-redirect/cross-insecure.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/same-https.keep-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/fetch-request/keep-origin-redirect/cross-insecure.http.html",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/fetch-request/no-redirect/cross-insecure.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/same-https.no-redirect.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/fetch-request/no-redirect/cross-insecure.http.html",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/fetch-request/swap-origin-redirect/cross-insecure.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/same-https.swap-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/fetch-request/swap-origin-redirect/cross-insecure.http.html",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-insecure.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin/fetch/cross-http.keep-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-insecure.http.html",
+ "referrer-policy/gen/top.meta/strict-origin/fetch/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/iframe-tag/no-redirect/cross-insecure.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin/fetch/cross-http.no-redirect.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/iframe-tag/no-redirect/cross-insecure.http.html",
+ "referrer-policy/gen/top.meta/strict-origin/fetch/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-insecure.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin/fetch/cross-http.swap-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-insecure.http.html",
+ "referrer-policy/gen/top.meta/strict-origin/fetch/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/cross-insecure.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin/fetch/cross-https.keep-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/cross-insecure.http.html",
+ "referrer-policy/gen/top.meta/strict-origin/fetch/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/no-redirect/cross-insecure.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin/fetch/cross-https.no-redirect.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/no-redirect/cross-insecure.http.html",
+ "referrer-policy/gen/top.meta/strict-origin/fetch/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/cross-insecure.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin/fetch/cross-https.swap-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/cross-insecure.http.html",
+ "referrer-policy/gen/top.meta/strict-origin/fetch/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/cross-insecure.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin/fetch/same-http.keep-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/cross-insecure.http.html",
+ "referrer-policy/gen/top.meta/strict-origin/fetch/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/script-tag/no-redirect/cross-insecure.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin/fetch/same-http.no-redirect.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/script-tag/no-redirect/cross-insecure.http.html",
+ "referrer-policy/gen/top.meta/strict-origin/fetch/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/cross-insecure.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin/fetch/same-http.swap-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/cross-insecure.http.html",
+ "referrer-policy/gen/top.meta/strict-origin/fetch/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/xhr-request/keep-origin-redirect/cross-insecure.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin/fetch/same-https.keep-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/xhr-request/keep-origin-redirect/cross-insecure.http.html",
+ "referrer-policy/gen/top.meta/strict-origin/fetch/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/xhr-request/no-redirect/cross-insecure.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin/fetch/same-https.no-redirect.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/xhr-request/no-redirect/cross-insecure.http.html",
+ "referrer-policy/gen/top.meta/strict-origin/fetch/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/xhr-request/swap-origin-redirect/cross-insecure.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin/fetch/same-https.swap-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/xhr-request/swap-origin-redirect/cross-insecure.http.html",
+ "referrer-policy/gen/top.meta/strict-origin/fetch/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin/iframe-tag/cross-http.keep-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/strict-origin/iframe-tag/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin/iframe-tag/cross-http.no-redirect.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/strict-origin/iframe-tag/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin/iframe-tag/cross-http.swap-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/strict-origin/iframe-tag/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin/iframe-tag/cross-https.keep-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/strict-origin/iframe-tag/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin/iframe-tag/cross-https.no-redirect.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/strict-origin/iframe-tag/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin/iframe-tag/cross-https.swap-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/strict-origin/iframe-tag/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin/iframe-tag/same-http.keep-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/strict-origin/iframe-tag/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin/iframe-tag/same-http.no-redirect.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/strict-origin/iframe-tag/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin/iframe-tag/same-http.swap-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/strict-origin/iframe-tag/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin/iframe-tag/same-https.keep-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/strict-origin/iframe-tag/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin/iframe-tag/same-https.no-redirect.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/strict-origin/iframe-tag/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin/iframe-tag/same-https.swap-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/strict-origin/iframe-tag/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin/script-tag/cross-http.keep-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/strict-origin/script-tag/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin/script-tag/cross-http.no-redirect.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/strict-origin/script-tag/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin/script-tag/cross-http.swap-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/strict-origin/script-tag/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin/script-tag/cross-https.keep-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/strict-origin/script-tag/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/a-tag/no-redirect/same-insecure.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin/script-tag/cross-https.no-redirect.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/a-tag/no-redirect/same-insecure.http.html",
+ "referrer-policy/gen/top.meta/strict-origin/script-tag/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/fetch-request/keep-origin-redirect/same-insecure.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin/script-tag/cross-https.swap-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/fetch-request/keep-origin-redirect/same-insecure.http.html",
+ "referrer-policy/gen/top.meta/strict-origin/script-tag/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/fetch-request/no-redirect/same-insecure.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin/script-tag/same-http.keep-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/fetch-request/no-redirect/same-insecure.http.html",
+ "referrer-policy/gen/top.meta/strict-origin/script-tag/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/fetch-request/swap-origin-redirect/same-insecure.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin/script-tag/same-http.no-redirect.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/fetch-request/swap-origin-redirect/same-insecure.http.html",
+ "referrer-policy/gen/top.meta/strict-origin/script-tag/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/same-insecure.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin/script-tag/same-http.swap-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/same-insecure.http.html",
+ "referrer-policy/gen/top.meta/strict-origin/script-tag/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/iframe-tag/no-redirect/same-insecure.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin/script-tag/same-https.keep-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/iframe-tag/no-redirect/same-insecure.http.html",
+ "referrer-policy/gen/top.meta/strict-origin/script-tag/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/same-insecure.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin/script-tag/same-https.no-redirect.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/same-insecure.http.html",
+ "referrer-policy/gen/top.meta/strict-origin/script-tag/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/img-tag/keep-origin-redirect/same-insecure.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin/script-tag/same-https.swap-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/img-tag/keep-origin-redirect/same-insecure.http.html",
+ "referrer-policy/gen/top.meta/strict-origin/script-tag/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/img-tag/no-redirect/same-insecure.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin/sharedworker-classic/same-http.keep-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/img-tag/no-redirect/same-insecure.http.html",
+ "referrer-policy/gen/top.meta/strict-origin/sharedworker-classic/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/img-tag/swap-origin-redirect/same-insecure.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin/sharedworker-classic/same-http.no-redirect.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/img-tag/swap-origin-redirect/same-insecure.http.html",
+ "referrer-policy/gen/top.meta/strict-origin/sharedworker-classic/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/module-worker/keep-origin-redirect/same-insecure.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin/worker-classic/same-http.keep-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/module-worker/keep-origin-redirect/same-insecure.http.html",
+ "referrer-policy/gen/top.meta/strict-origin/worker-classic/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/module-worker/no-redirect/same-insecure.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin/worker-classic/same-http.no-redirect.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/module-worker/no-redirect/same-insecure.http.html",
+ "referrer-policy/gen/top.meta/strict-origin/worker-classic/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/script-tag/keep-origin-redirect/same-insecure.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin/worker-module/same-http.keep-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/script-tag/keep-origin-redirect/same-insecure.http.html",
+ "referrer-policy/gen/top.meta/strict-origin/worker-module/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/script-tag/no-redirect/same-insecure.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin/worker-module/same-http.no-redirect.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/script-tag/no-redirect/same-insecure.http.html",
+ "referrer-policy/gen/top.meta/strict-origin/worker-module/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/script-tag/swap-origin-redirect/same-insecure.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin/xhr/cross-http.keep-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/script-tag/swap-origin-redirect/same-insecure.http.html",
+ "referrer-policy/gen/top.meta/strict-origin/xhr/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/shared-worker/keep-origin-redirect/same-insecure.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin/xhr/cross-http.no-redirect.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/shared-worker/keep-origin-redirect/same-insecure.http.html",
+ "referrer-policy/gen/top.meta/strict-origin/xhr/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/shared-worker/no-redirect/same-insecure.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin/xhr/cross-http.swap-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/shared-worker/no-redirect/same-insecure.http.html",
+ "referrer-policy/gen/top.meta/strict-origin/xhr/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/worker-request/keep-origin-redirect/same-insecure.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin/xhr/cross-https.keep-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/worker-request/keep-origin-redirect/same-insecure.http.html",
+ "referrer-policy/gen/top.meta/strict-origin/xhr/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/worker-request/no-redirect/same-insecure.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin/xhr/cross-https.no-redirect.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/worker-request/no-redirect/same-insecure.http.html",
+ "referrer-policy/gen/top.meta/strict-origin/xhr/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/xhr-request/keep-origin-redirect/same-insecure.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin/xhr/cross-https.swap-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/xhr-request/keep-origin-redirect/same-insecure.http.html",
+ "referrer-policy/gen/top.meta/strict-origin/xhr/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/xhr-request/no-redirect/same-insecure.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin/xhr/same-http.keep-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/xhr-request/no-redirect/same-insecure.http.html",
+ "referrer-policy/gen/top.meta/strict-origin/xhr/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/xhr-request/swap-origin-redirect/same-insecure.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin/xhr/same-http.no-redirect.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/xhr-request/swap-origin-redirect/same-insecure.http.html",
+ "referrer-policy/gen/top.meta/strict-origin/xhr/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin/xhr/same-http.swap-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/strict-origin/xhr/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin/xhr/same-https.keep-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/strict-origin/xhr/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin/xhr/same-https.no-redirect.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/strict-origin/xhr/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/strict-origin/xhr/same-https.swap-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/strict-origin/xhr/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unsafe-url/fetch/cross-http.keep-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/unsafe-url/fetch/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unsafe-url/fetch/cross-http.no-redirect.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/unsafe-url/fetch/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unsafe-url/fetch/cross-http.swap-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/unsafe-url/fetch/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unsafe-url/fetch/cross-https.keep-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/unsafe-url/fetch/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unsafe-url/fetch/cross-https.no-redirect.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/unsafe-url/fetch/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unsafe-url/fetch/cross-https.swap-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/unsafe-url/fetch/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unsafe-url/fetch/same-http.keep-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/unsafe-url/fetch/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unsafe-url/fetch/same-http.no-redirect.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/unsafe-url/fetch/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unsafe-url/fetch/same-http.swap-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/unsafe-url/fetch/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unsafe-url/fetch/same-https.keep-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/unsafe-url/fetch/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unsafe-url/fetch/same-https.no-redirect.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/unsafe-url/fetch/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unsafe-url/fetch/same-https.swap-origin.http.html": [
[
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/unsafe-url/fetch/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unsafe-url/iframe-tag/cross-http.keep-origin.http.html": [
[
- "referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.meta/unsafe-url/iframe-tag/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unsafe-url/iframe-tag/cross-http.no-redirect.http.html": [
[
- "referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.meta/unsafe-url/iframe-tag/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unsafe-url/iframe-tag/cross-http.swap-origin.http.html": [
[
- "referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.meta/unsafe-url/iframe-tag/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unsafe-url/iframe-tag/cross-https.keep-origin.http.html": [
[
- "referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.meta/unsafe-url/iframe-tag/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unsafe-url/iframe-tag/cross-https.no-redirect.http.html": [
[
- "referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.meta/unsafe-url/iframe-tag/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unsafe-url/iframe-tag/cross-https.swap-origin.http.html": [
[
- "referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.meta/unsafe-url/iframe-tag/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unsafe-url/iframe-tag/same-http.keep-origin.http.html": [
[
- "referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.meta/unsafe-url/iframe-tag/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unsafe-url/iframe-tag/same-http.no-redirect.http.html": [
[
- "referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.meta/unsafe-url/iframe-tag/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unsafe-url/iframe-tag/same-http.swap-origin.http.html": [
[
- "referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.meta/unsafe-url/iframe-tag/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unsafe-url/iframe-tag/same-https.keep-origin.http.html": [
[
- "referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.meta/unsafe-url/iframe-tag/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unsafe-url/iframe-tag/same-https.no-redirect.http.html": [
[
- "referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/unsafe-url/iframe-tag/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unsafe-url/iframe-tag/same-https.swap-origin.http.html": [
[
- "referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/unsafe-url/iframe-tag/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unsafe-url/script-tag/cross-http.keep-origin.http.html": [
[
- "referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/unsafe-url/script-tag/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unsafe-url/script-tag/cross-http.no-redirect.http.html": [
[
- "referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/unsafe-url/script-tag/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unsafe-url/script-tag/cross-http.swap-origin.http.html": [
[
- "referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/unsafe-url/script-tag/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unsafe-url/script-tag/cross-https.keep-origin.http.html": [
[
- "referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/unsafe-url/script-tag/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unsafe-url/script-tag/cross-https.no-redirect.http.html": [
[
- "referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/unsafe-url/script-tag/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unsafe-url/script-tag/cross-https.swap-origin.http.html": [
[
- "referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/unsafe-url/script-tag/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unsafe-url/script-tag/same-http.keep-origin.http.html": [
[
- "referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/unsafe-url/script-tag/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unsafe-url/script-tag/same-http.no-redirect.http.html": [
[
- "referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/unsafe-url/script-tag/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin/attr-referrer/same-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unsafe-url/script-tag/same-http.swap-origin.http.html": [
[
- "referrer-policy/strict-origin/attr-referrer/same-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.meta/unsafe-url/script-tag/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin/attr-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unsafe-url/script-tag/same-https.keep-origin.http.html": [
[
- "referrer-policy/strict-origin/attr-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.meta/unsafe-url/script-tag/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin/attr-referrer/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unsafe-url/script-tag/same-https.no-redirect.http.html": [
[
- "referrer-policy/strict-origin/attr-referrer/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.meta/unsafe-url/script-tag/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin/attr-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unsafe-url/script-tag/same-https.swap-origin.http.html": [
[
- "referrer-policy/strict-origin/attr-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.meta/unsafe-url/script-tag/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html": [
[
- "referrer-policy/strict-origin/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.meta/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin/attr-referrer/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html": [
[
- "referrer-policy/strict-origin/attr-referrer/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.meta/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unsafe-url/worker-classic/same-http.keep-origin.http.html": [
[
- "referrer-policy/strict-origin/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.meta/unsafe-url/worker-classic/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin/attr-referrer/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unsafe-url/worker-classic/same-http.no-redirect.http.html": [
[
- "referrer-policy/strict-origin/attr-referrer/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.meta/unsafe-url/worker-classic/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin/attr-referrer/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unsafe-url/worker-module/same-http.keep-origin.http.html": [
[
- "referrer-policy/strict-origin/attr-referrer/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.meta/unsafe-url/worker-module/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin/attr-referrer/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unsafe-url/worker-module/same-http.no-redirect.http.html": [
[
- "referrer-policy/strict-origin/attr-referrer/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.meta/unsafe-url/worker-module/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin/attr-referrer/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unsafe-url/xhr/cross-http.keep-origin.http.html": [
[
- "referrer-policy/strict-origin/attr-referrer/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/unsafe-url/xhr/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin/attr-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unsafe-url/xhr/cross-http.no-redirect.http.html": [
[
- "referrer-policy/strict-origin/attr-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/unsafe-url/xhr/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin/attr-referrer/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unsafe-url/xhr/cross-http.swap-origin.http.html": [
[
- "referrer-policy/strict-origin/attr-referrer/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/unsafe-url/xhr/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unsafe-url/xhr/cross-https.keep-origin.http.html": [
[
- "referrer-policy/strict-origin/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/unsafe-url/xhr/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unsafe-url/xhr/cross-https.no-redirect.http.html": [
[
- "referrer-policy/strict-origin/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/unsafe-url/xhr/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin/attr-referrer/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unsafe-url/xhr/cross-https.swap-origin.http.html": [
[
- "referrer-policy/strict-origin/attr-referrer/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/unsafe-url/xhr/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unsafe-url/xhr/same-http.keep-origin.http.html": [
[
- "referrer-policy/strict-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/unsafe-url/xhr/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin/attr-referrer/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unsafe-url/xhr/same-http.no-redirect.http.html": [
[
- "referrer-policy/strict-origin/attr-referrer/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/unsafe-url/xhr/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin/attr-referrer/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unsafe-url/xhr/same-http.swap-origin.http.html": [
[
- "referrer-policy/strict-origin/attr-referrer/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/unsafe-url/xhr/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unsafe-url/xhr/same-https.keep-origin.http.html": [
[
- "referrer-policy/strict-origin/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/unsafe-url/xhr/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unsafe-url/xhr/same-https.no-redirect.http.html": [
[
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.meta/unsafe-url/xhr/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unsafe-url/xhr/same-https.swap-origin.http.html": [
[
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.meta/unsafe-url/xhr/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unset/fetch/cross-http.keep-origin.http.html": [
[
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.meta/unset/fetch/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unset/fetch/cross-http.no-redirect.http.html": [
[
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.meta/unset/fetch/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unset/fetch/cross-http.swap-origin.http.html": [
[
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.meta/unset/fetch/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unset/fetch/cross-https.keep-origin.http.html": [
[
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.meta/unset/fetch/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unset/fetch/cross-https.no-redirect.http.html": [
[
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.meta/unset/fetch/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unset/fetch/cross-https.swap-origin.http.html": [
[
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.meta/unset/fetch/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unset/fetch/same-http.keep-origin.http.html": [
[
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.meta/unset/fetch/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unset/fetch/same-http.no-redirect.http.html": [
[
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.meta/unset/fetch/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unset/fetch/same-http.swap-origin.http.html": [
[
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.meta/unset/fetch/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unset/fetch/same-https.keep-origin.http.html": [
[
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.meta/unset/fetch/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unset/fetch/same-https.no-redirect.http.html": [
[
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.meta/unset/fetch/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unset/fetch/same-https.swap-origin.http.html": [
[
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.meta/unset/fetch/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unset/iframe-tag/cross-http.keep-origin.http.html": [
[
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.meta/unset/iframe-tag/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unset/iframe-tag/cross-http.no-redirect.http.html": [
[
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.meta/unset/iframe-tag/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unset/iframe-tag/cross-http.swap-origin.http.html": [
[
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/unset/iframe-tag/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unset/iframe-tag/cross-https.keep-origin.http.html": [
[
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/unset/iframe-tag/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unset/iframe-tag/cross-https.no-redirect.http.html": [
[
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/unset/iframe-tag/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unset/iframe-tag/cross-https.swap-origin.http.html": [
[
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/unset/iframe-tag/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unset/iframe-tag/same-http.keep-origin.http.html": [
[
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/unset/iframe-tag/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unset/iframe-tag/same-http.no-redirect.http.html": [
[
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/unset/iframe-tag/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unset/iframe-tag/same-http.swap-origin.http.html": [
[
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/unset/iframe-tag/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unset/iframe-tag/same-https.keep-origin.http.html": [
[
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/unset/iframe-tag/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unset/iframe-tag/same-https.no-redirect.http.html": [
[
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/unset/iframe-tag/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unset/iframe-tag/same-https.swap-origin.http.html": [
[
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/unset/iframe-tag/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unset/script-tag/cross-http.keep-origin.http.html": [
[
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/unset/script-tag/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unset/script-tag/cross-http.no-redirect.http.html": [
[
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/unset/script-tag/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unset/script-tag/cross-http.swap-origin.http.html": [
[
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/unset/script-tag/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unset/script-tag/cross-https.keep-origin.http.html": [
[
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/unset/script-tag/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unset/script-tag/cross-https.no-redirect.http.html": [
[
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/unset/script-tag/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unset/script-tag/cross-https.swap-origin.http.html": [
[
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/unset/script-tag/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unset/script-tag/same-http.keep-origin.http.html": [
[
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.meta/unset/script-tag/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unset/script-tag/same-http.no-redirect.http.html": [
[
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.meta/unset/script-tag/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unset/script-tag/same-http.swap-origin.http.html": [
[
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.meta/unset/script-tag/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unset/script-tag/same-https.keep-origin.http.html": [
[
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.meta/unset/script-tag/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unset/script-tag/same-https.no-redirect.http.html": [
[
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.meta/unset/script-tag/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unset/script-tag/same-https.swap-origin.http.html": [
[
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.meta/unset/script-tag/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unset/sharedworker-classic/same-http.keep-origin.http.html": [
[
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.meta/unset/sharedworker-classic/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unset/sharedworker-classic/same-http.no-redirect.http.html": [
[
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.meta/unset/sharedworker-classic/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unset/worker-classic/same-http.keep-origin.http.html": [
[
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.meta/unset/worker-classic/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unset/worker-classic/same-http.no-redirect.http.html": [
[
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.meta/unset/worker-classic/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unset/worker-module/same-http.keep-origin.http.html": [
[
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.meta/unset/worker-module/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/module-worker/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unset/worker-module/same-http.no-redirect.http.html": [
[
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/module-worker/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.meta/unset/worker-module/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unset/xhr/cross-http.keep-origin.http.html": [
[
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.meta/unset/xhr/cross-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unset/xhr/cross-http.no-redirect.http.html": [
[
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.meta/unset/xhr/cross-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unset/xhr/cross-http.swap-origin.http.html": [
[
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.meta/unset/xhr/cross-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unset/xhr/cross-https.keep-origin.http.html": [
[
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.meta/unset/xhr/cross-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/shared-worker/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unset/xhr/cross-https.no-redirect.http.html": [
[
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/shared-worker/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.meta/unset/xhr/cross-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unset/xhr/cross-https.swap-origin.http.html": [
[
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.meta/unset/xhr/cross-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/worker-request/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unset/xhr/same-http.keep-origin.http.html": [
[
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/worker-request/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.meta/unset/xhr/same-http.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unset/xhr/same-http.no-redirect.http.html": [
[
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.meta/unset/xhr/same-http.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unset/xhr/same-http.swap-origin.http.html": [
[
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.meta/unset/xhr/same-http.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unset/xhr/same-https.keep-origin.http.html": [
[
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/gen/top.meta/unset/xhr/same-https.keep-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unset/xhr/same-https.no-redirect.http.html": [
[
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/unset/xhr/same-https.no-redirect.http.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/gen/top.meta/unset/xhr/same-https.swap-origin.http.html": [
[
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/gen/top.meta/unset/xhr/same-https.swap-origin.http.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/generic/iframe-src-change.html": [
[
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/generic/iframe-src-change.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/generic/inheritance/iframe-inheritance-data.html": [
[
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/generic/inheritance/iframe-inheritance-data.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/generic/inheritance/iframe-inheritance-srcdoc-child.html": [
[
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/generic/inheritance/iframe-inheritance-srcdoc-child.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/generic/inheritance/iframe-inheritance-srcdoc.html": [
[
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/generic/inheritance/iframe-inheritance-srcdoc.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/generic/link-rel-prefetch.html": [
[
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/generic/link-rel-prefetch.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/generic/multiple-headers-and-values.html": [
[
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/generic/multiple-headers-and-values.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/generic/multiple-headers-combined.html": [
[
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/generic/multiple-headers-combined.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/generic/multiple-headers-one-invalid.html": [
[
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/generic/multiple-headers-one-invalid.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/generic/multiple-headers-one-unknown-token.html": [
[
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/generic/multiple-headers-one-unknown-token.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/generic/multiple-headers.html": [
[
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/generic/multiple-headers.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/generic/sandboxed-iframe-with-opaque-origin.html": [
[
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/generic/sandboxed-iframe-with-opaque-origin.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/generic/subresource-test/area-navigate.html": [
[
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/generic/subresource-test/area-navigate.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/generic/subresource-test/attr-referrer-invalid-value.html": [
[
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/generic/subresource-test/attr-referrer-invalid-value.html",
{}
]
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/generic/subresource-test/fetch-messaging.html": [
[
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/generic/subresource-test/fetch-messaging.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/generic/subresource-test/iframe-messaging.html": [
[
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/generic/subresource-test/iframe-messaging.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/generic/subresource-test/image-decoding.html": [
[
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/generic/subresource-test/image-decoding.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/generic/subresource-test/link-navigate.html": [
[
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/generic/subresource-test/link-navigate.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/generic/subresource-test/script-messaging.html": [
[
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/generic/subresource-test/script-messaging.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/generic/subresource-test/worker-messaging.html": [
[
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/generic/subresource-test/worker-messaging.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/generic/subresource-test/xhr-messaging.html": [
[
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/generic/subresource-test/xhr-messaging.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/generic/unsupported-csp-referrer-directive.html": [
[
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/generic/unsupported-csp-referrer-directive.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html": [
[
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html": [
[
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html": [
[
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html": [
[
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html": [
[
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html": [
[
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html": [
[
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html": [
[
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html": [
[
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html": [
[
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html": [
[
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html": [
[
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html": [
[
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html": [
[
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html": [
[
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html": [
[
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html": [
[
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html": [
[
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html": [
[
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html": [
[
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/module-worker/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/module-worker/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/module-worker/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/module-worker/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/shared-worker/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html": [
[
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/shared-worker/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/shared-worker/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/shared-worker/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/worker-request/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html": [
[
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/worker-request/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/worker-request/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/worker-request/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html": [
[
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html": [
[
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html": [
[
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html": [
[
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html": [
[
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html": [
[
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html": [
[
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html": [
[
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/a-tag/no-redirect/generic.http.html": [
[
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/a-tag/no-redirect/generic.http.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html": [
[
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html": [
[
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/a-tag/no-redirect/generic.http.html": [
+ "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/a-tag/no-redirect/generic.http.html",
+ "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html": [
+ "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/img-tag/no-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html",
+ "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/img-tag/no-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/img-tag/no-redirect/generic.http.html": [
+ "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/script-tag/no-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/img-tag/no-redirect/generic.http.html",
+ "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/script-tag/no-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/a-tag/no-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/a-tag/no-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/script-tag/no-redirect/generic.http.html": [
+ "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/script-tag/no-redirect/generic.http.html",
+ "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/a-tag/no-redirect/generic.http.html": [
+ "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/a-tag/no-redirect/generic.http.html",
+ "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html": [
+ "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/img-tag/no-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html",
+ "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/img-tag/no-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/img-tag/no-redirect/generic.http.html": [
+ "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/script-tag/no-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/img-tag/no-redirect/generic.http.html",
+ "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/script-tag/no-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/a-tag/no-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/a-tag/no-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/script-tag/no-redirect/generic.http.html": [
+ "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/script-tag/no-redirect/generic.http.html",
+ "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/iframe-tag/no-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/iframe-tag/no-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/a-tag/no-redirect/generic.http.html": [
+ "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/a-tag/no-redirect/generic.http.html",
+ "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/iframe-tag/no-redirect/generic.http.html": [
+ "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/img-tag/no-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/iframe-tag/no-redirect/generic.http.html",
+ "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/img-tag/no-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/img-tag/no-redirect/generic.http.html": [
+ "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/script-tag/no-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/img-tag/no-redirect/generic.http.html",
+ "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/script-tag/no-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/a-tag/no-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/a-tag/no-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/script-tag/no-redirect/generic.http.html": [
+ "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/script-tag/no-redirect/generic.http.html",
+ "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/iframe-tag/no-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/iframe-tag/no-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/a-tag/no-redirect/generic.http.html": [
+ "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/a-tag/no-redirect/generic.http.html",
+ "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/iframe-tag/no-redirect/generic.http.html": [
+ "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/img-tag/no-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/iframe-tag/no-redirect/generic.http.html",
+ "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/img-tag/no-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/img-tag/no-redirect/generic.http.html": [
+ "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/script-tag/no-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/img-tag/no-redirect/generic.http.html",
+ "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/script-tag/no-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/no-referrer/http-rp/cross-origin/http-http/a-tag/no-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/no-referrer/http-rp/cross-origin/http-http/a-tag/no-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/script-tag/no-redirect/generic.http.html": [
+ "referrer-policy/no-referrer/http-rp/cross-origin/http-https/a-tag/no-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/script-tag/no-redirect/generic.http.html",
+ "referrer-policy/no-referrer/http-rp/cross-origin/http-https/a-tag/no-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/no-referrer/http-rp/same-origin/http-http/a-tag/no-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/no-referrer/http-rp/same-origin/http-http/a-tag/no-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/a-tag/no-redirect/generic.http.html": [
+ "referrer-policy/no-referrer/http-rp/same-origin/http-https/a-tag/no-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/a-tag/no-redirect/generic.http.html",
+ "referrer-policy/no-referrer/http-rp/same-origin/http-https/a-tag/no-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/a-tag/no-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html",
+ "referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/a-tag/no-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/fetch-request/no-redirect/generic.http.html": [
+ "referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/fetch-request/no-redirect/generic.http.html",
+ "referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/img-tag/no-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html",
+ "referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/img-tag/no-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html": [
+ "referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/a-tag/no-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html",
+ "referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/a-tag/no-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/img-tag/no-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/img-tag/no-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/no-redirect/generic.http.html": [
+ "referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/no-redirect/generic.http.html",
+ "referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/a-tag/no-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/a-tag/no-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/script-tag/no-redirect/generic.http.html": [
+ "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/img-tag/no-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/script-tag/no-redirect/generic.http.html",
+ "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/img-tag/no-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/no-referrer/meta-referrer/same-origin/http-https/a-tag/no-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html",
+ "referrer-policy/no-referrer/meta-referrer/same-origin/http-https/a-tag/no-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/xhr-request/no-redirect/generic.http.html": [
+ "referrer-policy/no-referrer/meta-referrer/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/xhr-request/no-redirect/generic.http.html",
+ "referrer-policy/no-referrer/meta-referrer/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/no-referrer/meta-referrer/same-origin/http-https/img-tag/no-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html",
+ "referrer-policy/no-referrer/meta-referrer/same-origin/http-https/img-tag/no-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/a-tag/no-redirect/generic.http.html": [
+ "referrer-policy/no-referrer/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/a-tag/no-redirect/generic.http.html",
+ "referrer-policy/no-referrer/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/a-tag/no-redirect/cross-origin.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html",
+ "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/a-tag/no-redirect/cross-origin.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/fetch-request/no-redirect/generic.http.html": [
+ "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-origin.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/fetch-request/no-redirect/generic.http.html",
+ "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-origin.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/iframe-tag/no-redirect/cross-origin.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html",
+ "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/iframe-tag/no-redirect/cross-origin.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-origin.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-origin.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html": [
+ "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/cross-origin.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html",
+ "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/cross-origin.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/no-redirect/cross-origin.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/no-redirect/cross-origin.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/cross-origin.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/cross-origin.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/no-redirect/generic.http.html": [
+ "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/cross-origin.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/no-redirect/generic.http.html",
+ "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/cross-origin.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/script-tag/no-redirect/cross-origin.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/script-tag/no-redirect/cross-origin.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/cross-origin.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/cross-origin.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/script-tag/no-redirect/generic.http.html": [
+ "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/a-tag/no-redirect/cross-origin.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/script-tag/no-redirect/generic.http.html",
+ "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/a-tag/no-redirect/cross-origin.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/cross-origin.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/cross-origin.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/iframe-tag/no-redirect/cross-origin.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html",
+ "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/iframe-tag/no-redirect/cross-origin.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/xhr-request/no-redirect/generic.http.html": [
+ "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/cross-origin.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/xhr-request/no-redirect/generic.http.html",
+ "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/cross-origin.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/cross-origin.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html",
+ "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/cross-origin.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/a-tag/no-redirect/generic.http.html": [
+ "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/no-redirect/cross-origin.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/a-tag/no-redirect/generic.http.html",
+ "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/no-redirect/cross-origin.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/cross-origin.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html",
+ "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/cross-origin.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/fetch-request/no-redirect/generic.http.html": [
+ "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/cross-origin.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/fetch-request/no-redirect/generic.http.html",
+ "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/cross-origin.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/script-tag/no-redirect/cross-origin.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html",
+ "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/script-tag/no-redirect/cross-origin.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/cross-origin.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/cross-origin.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/iframe-tag/no-redirect/generic.http.html": [
+ "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/a-tag/no-redirect/same-origin-insecure.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/iframe-tag/no-redirect/generic.http.html",
+ "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/a-tag/no-redirect/same-origin-insecure.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/same-origin-insecure.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/same-origin-insecure.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/iframe-tag/no-redirect/same-origin-insecure.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/iframe-tag/no-redirect/same-origin-insecure.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/no-redirect/generic.http.html": [
+ "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/no-redirect/generic.http.html",
+ "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/same-origin-insecure.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/same-origin-insecure.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/no-redirect/same-origin-insecure.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/generic.http.html",
+ "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/no-redirect/same-origin-insecure.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/module-worker/no-redirect/generic.http.html": [
+ "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/same-origin-insecure.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/module-worker/no-redirect/generic.http.html",
+ "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/same-origin-insecure.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/script-tag/keep-origin-redirect/same-origin-insecure.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/script-tag/keep-origin-redirect/same-origin-insecure.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/script-tag/no-redirect/generic.http.html": [
+ "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/script-tag/no-redirect/same-origin-insecure.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/script-tag/no-redirect/generic.http.html",
+ "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/script-tag/no-redirect/same-origin-insecure.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/script-tag/swap-origin-redirect/same-origin-insecure.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/script-tag/swap-origin-redirect/same-origin-insecure.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/a-tag/no-redirect/same-origin-upgrade.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/generic.http.html",
+ "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/a-tag/no-redirect/same-origin-upgrade.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/shared-worker/no-redirect/generic.http.html": [
+ "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-upgrade.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/shared-worker/no-redirect/generic.http.html",
+ "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-upgrade.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/no-redirect/same-origin-upgrade.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/generic.http.html",
+ "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/no-redirect/same-origin-upgrade.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/worker-request/no-redirect/generic.http.html": [
+ "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/worker-request/no-redirect/generic.http.html",
+ "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-upgrade.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html",
+ "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-upgrade.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/xhr-request/no-redirect/generic.http.html": [
+ "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/no-redirect/same-origin-upgrade.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/xhr-request/no-redirect/generic.http.html",
+ "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/no-redirect/same-origin-upgrade.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html",
+ "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/a-tag/no-redirect/generic.http.html": [
+ "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-upgrade.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/a-tag/no-redirect/generic.http.html",
+ "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-upgrade.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/no-redirect/same-origin-upgrade.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html",
+ "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/no-redirect/same-origin-upgrade.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/fetch-request/no-redirect/generic.http.html": [
+ "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/fetch-request/no-redirect/generic.http.html",
+ "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/a-tag/no-redirect/cross-origin.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html",
+ "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/a-tag/no-redirect/cross-origin.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/a-tag/no-redirect/cross-origin.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/a-tag/no-redirect/cross-origin.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/iframe-tag/no-redirect/generic.http.html": [
+ "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/a-tag/no-redirect/same-origin-insecure.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/iframe-tag/no-redirect/generic.http.html",
+ "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/a-tag/no-redirect/same-origin-insecure.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/a-tag/no-redirect/same-origin-upgrade.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/a-tag/no-redirect/same-origin-upgrade.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/a-tag/no-redirect/cross-origin.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/a-tag/no-redirect/cross-origin.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/no-redirect/generic.http.html": [
+ "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/cross-origin.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/no-redirect/generic.http.html",
+ "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/cross-origin.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/no-redirect/cross-origin.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/no-redirect/cross-origin.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/cross-origin.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/cross-origin.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/script-tag/no-redirect/generic.http.html": [
+ "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/a-tag/no-redirect/cross-origin.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/script-tag/no-redirect/generic.http.html",
+ "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/a-tag/no-redirect/cross-origin.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/cross-origin.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/cross-origin.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/img-tag/no-redirect/cross-origin.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html",
+ "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/img-tag/no-redirect/cross-origin.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/xhr-request/no-redirect/generic.http.html": [
+ "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/cross-origin.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/xhr-request/no-redirect/generic.http.html",
+ "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/cross-origin.http.html",
{}
]
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/a-tag/no-redirect/same-origin-insecure.http.html": [
[
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html",
+ "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/a-tag/no-redirect/same-origin-insecure.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/a-tag/no-redirect/generic.http.html": [
+ "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/img-tag/keep-origin-redirect/same-origin-insecure.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/a-tag/no-redirect/generic.http.html",
+ "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/img-tag/keep-origin-redirect/same-origin-insecure.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/img-tag/no-redirect/same-origin-insecure.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html",
+ "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/img-tag/no-redirect/same-origin-insecure.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/fetch-request/no-redirect/generic.http.html": [
+ "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/img-tag/swap-origin-redirect/same-origin-insecure.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/fetch-request/no-redirect/generic.http.html",
+ "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/img-tag/swap-origin-redirect/same-origin-insecure.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/a-tag/no-redirect/same-origin-upgrade.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html",
+ "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/a-tag/no-redirect/same-origin-upgrade.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-upgrade.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-upgrade.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html": [
+ "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/no-redirect/same-origin-upgrade.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html",
+ "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/no-redirect/same-origin-upgrade.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/origin/attr-referrer/cross-origin/http-http/a-tag/no-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/origin/attr-referrer/cross-origin/http-http/a-tag/no-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/img-tag/no-redirect/generic.http.html": [
+ "referrer-policy/origin/attr-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/img-tag/no-redirect/generic.http.html",
+ "referrer-policy/origin/attr-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/origin/attr-referrer/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/origin/attr-referrer/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/origin/attr-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/origin/attr-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/script-tag/no-redirect/generic.http.html": [
+ "referrer-policy/origin/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/script-tag/no-redirect/generic.http.html",
+ "referrer-policy/origin/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/origin/attr-referrer/cross-origin/http-http/img-tag/no-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/origin/attr-referrer/cross-origin/http-http/img-tag/no-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/origin/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html",
+ "referrer-policy/origin/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/xhr-request/no-redirect/generic.http.html": [
+ "referrer-policy/origin/attr-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/xhr-request/no-redirect/generic.http.html",
+ "referrer-policy/origin/attr-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/origin/attr-referrer/cross-origin/http-http/script-tag/no-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html",
+ "referrer-policy/origin/attr-referrer/cross-origin/http-http/script-tag/no-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/a-tag/no-redirect/generic.http.html": [
+ "referrer-policy/origin/attr-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/a-tag/no-redirect/generic.http.html",
+ "referrer-policy/origin/attr-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/origin/attr-referrer/cross-origin/http-https/a-tag/no-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html",
+ "referrer-policy/origin/attr-referrer/cross-origin/http-https/a-tag/no-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/fetch-request/no-redirect/generic.http.html": [
+ "referrer-policy/origin/attr-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/fetch-request/no-redirect/generic.http.html",
+ "referrer-policy/origin/attr-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/origin/attr-referrer/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html",
+ "referrer-policy/origin/attr-referrer/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/origin/attr-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/origin/attr-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html": [
+ "referrer-policy/origin/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html",
+ "referrer-policy/origin/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/origin/attr-referrer/cross-origin/http-https/img-tag/no-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/origin/attr-referrer/cross-origin/http-https/img-tag/no-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/origin/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/origin/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/img-tag/no-redirect/generic.http.html": [
+ "referrer-policy/origin/attr-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/img-tag/no-redirect/generic.http.html",
+ "referrer-policy/origin/attr-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/origin/attr-referrer/cross-origin/http-https/script-tag/no-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/origin/attr-referrer/cross-origin/http-https/script-tag/no-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/origin/attr-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/origin/attr-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/script-tag/no-redirect/generic.http.html": [
+ "referrer-policy/origin/attr-referrer/same-origin/http-http/a-tag/no-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/script-tag/no-redirect/generic.http.html",
+ "referrer-policy/origin/attr-referrer/same-origin/http-http/a-tag/no-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/origin/attr-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/origin/attr-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/origin/attr-referrer/same-origin/http-http/iframe-tag/no-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html",
+ "referrer-policy/origin/attr-referrer/same-origin/http-http/iframe-tag/no-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/xhr-request/no-redirect/generic.http.html": [
+ "referrer-policy/origin/attr-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/xhr-request/no-redirect/generic.http.html",
+ "referrer-policy/origin/attr-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/origin/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html",
+ "referrer-policy/origin/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/a-tag/no-redirect/generic.http.html": [
+ "referrer-policy/origin/attr-referrer/same-origin/http-http/img-tag/no-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/a-tag/no-redirect/generic.http.html",
+ "referrer-policy/origin/attr-referrer/same-origin/http-http/img-tag/no-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/origin/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html",
+ "referrer-policy/origin/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/fetch-request/no-redirect/generic.http.html": [
+ "referrer-policy/origin/attr-referrer/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/fetch-request/no-redirect/generic.http.html",
+ "referrer-policy/origin/attr-referrer/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/origin/attr-referrer/same-origin/http-http/script-tag/no-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html",
+ "referrer-policy/origin/attr-referrer/same-origin/http-http/script-tag/no-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/origin/attr-referrer/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/origin/attr-referrer/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/iframe-tag/no-redirect/generic.http.html": [
+ "referrer-policy/origin/attr-referrer/same-origin/http-https/a-tag/no-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/iframe-tag/no-redirect/generic.http.html",
+ "referrer-policy/origin/attr-referrer/same-origin/http-https/a-tag/no-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/origin/attr-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/origin/attr-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/origin/attr-referrer/same-origin/http-https/iframe-tag/no-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/origin/attr-referrer/same-origin/http-https/iframe-tag/no-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/img-tag/no-redirect/generic.http.html": [
+ "referrer-policy/origin/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/img-tag/no-redirect/generic.http.html",
+ "referrer-policy/origin/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/origin/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/origin/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html",
+ {}
+ ]
+ ],
+ "referrer-policy/origin/attr-referrer/same-origin/http-https/img-tag/no-redirect/generic.http.html": [
+ [
+ "referrer-policy/origin/attr-referrer/same-origin/http-https/img-tag/no-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/module-worker/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/module-worker/keep-origin-redirect/generic.http.html",
+ "referrer-policy/origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/module-worker/no-redirect/generic.http.html": [
+ "referrer-policy/origin/attr-referrer/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/module-worker/no-redirect/generic.http.html",
+ "referrer-policy/origin/attr-referrer/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/origin/attr-referrer/same-origin/http-https/script-tag/no-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/origin/attr-referrer/same-origin/http-https/script-tag/no-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/script-tag/no-redirect/generic.http.html": [
+ "referrer-policy/origin/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/script-tag/no-redirect/generic.http.html",
+ "referrer-policy/origin/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/origin/http-rp/cross-origin/http-http/a-tag/no-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/origin/http-rp/cross-origin/http-http/a-tag/no-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/shared-worker/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/origin/http-rp/cross-origin/http-https/a-tag/no-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/shared-worker/keep-origin-redirect/generic.http.html",
+ "referrer-policy/origin/http-rp/cross-origin/http-https/a-tag/no-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/shared-worker/no-redirect/generic.http.html": [
+ "referrer-policy/origin/http-rp/same-origin/http-http/a-tag/no-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/shared-worker/no-redirect/generic.http.html",
+ "referrer-policy/origin/http-rp/same-origin/http-http/a-tag/no-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/worker-request/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/origin/http-rp/same-origin/http-https/a-tag/no-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/worker-request/keep-origin-redirect/generic.http.html",
+ "referrer-policy/origin/http-rp/same-origin/http-https/a-tag/no-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/worker-request/no-redirect/generic.http.html": [
+ "referrer-policy/origin/meta-referrer/cross-origin/http-http/a-tag/no-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/worker-request/no-redirect/generic.http.html",
+ "referrer-policy/origin/meta-referrer/cross-origin/http-http/a-tag/no-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/origin/meta-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html",
+ "referrer-policy/origin/meta-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/xhr-request/no-redirect/generic.http.html": [
+ "referrer-policy/origin/meta-referrer/cross-origin/http-http/img-tag/no-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/xhr-request/no-redirect/generic.http.html",
+ "referrer-policy/origin/meta-referrer/cross-origin/http-http/img-tag/no-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/origin/meta-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html",
+ "referrer-policy/origin/meta-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/a-tag/no-redirect/generic.http.html": [
+ "referrer-policy/origin/meta-referrer/cross-origin/http-https/a-tag/no-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/a-tag/no-redirect/generic.http.html",
+ "referrer-policy/origin/meta-referrer/cross-origin/http-https/a-tag/no-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/origin/meta-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html",
+ "referrer-policy/origin/meta-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/fetch-request/no-redirect/generic.http.html": [
+ "referrer-policy/origin/meta-referrer/cross-origin/http-https/img-tag/no-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/fetch-request/no-redirect/generic.http.html",
+ "referrer-policy/origin/meta-referrer/cross-origin/http-https/img-tag/no-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/origin/meta-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html",
+ "referrer-policy/origin/meta-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/origin/meta-referrer/same-origin/http-http/a-tag/no-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/origin/meta-referrer/same-origin/http-http/a-tag/no-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/generic.http.html": [
+ "referrer-policy/origin/meta-referrer/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/generic.http.html",
+ "referrer-policy/origin/meta-referrer/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/origin/meta-referrer/same-origin/http-http/img-tag/no-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/origin/meta-referrer/same-origin/http-http/img-tag/no-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/origin/meta-referrer/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/origin/meta-referrer/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/img-tag/no-redirect/generic.http.html": [
+ "referrer-policy/origin/meta-referrer/same-origin/http-https/a-tag/no-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/img-tag/no-redirect/generic.http.html",
+ "referrer-policy/origin/meta-referrer/same-origin/http-https/a-tag/no-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/origin/meta-referrer/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/origin/meta-referrer/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/origin/meta-referrer/same-origin/http-https/img-tag/no-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html",
+ "referrer-policy/origin/meta-referrer/same-origin/http-https/img-tag/no-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/script-tag/no-redirect/generic.http.html": [
+ "referrer-policy/origin/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/script-tag/no-redirect/generic.http.html",
+ "referrer-policy/origin/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/same-origin/attr-referrer/cross-origin/http-http/a-tag/no-redirect/cross-origin.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html",
+ "referrer-policy/same-origin/attr-referrer/cross-origin/http-http/a-tag/no-redirect/cross-origin.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html": [
+ "referrer-policy/same-origin/attr-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-origin.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html",
+ "referrer-policy/same-origin/attr-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-origin.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/xhr-request/no-redirect/generic.http.html": [
+ "referrer-policy/same-origin/attr-referrer/cross-origin/http-http/iframe-tag/no-redirect/cross-origin.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/xhr-request/no-redirect/generic.http.html",
+ "referrer-policy/same-origin/attr-referrer/cross-origin/http-http/iframe-tag/no-redirect/cross-origin.http.html",
{}
]
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html": [
+ "referrer-policy/same-origin/attr-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-origin.http.html": [
[
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html",
+ "referrer-policy/same-origin/attr-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-origin.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/same-origin/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/cross-origin.http.html": [
[
- "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/same-origin/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/cross-origin.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/same-origin/attr-referrer/cross-origin/http-http/img-tag/no-redirect/cross-origin.http.html": [
[
- "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/same-origin/attr-referrer/cross-origin/http-http/img-tag/no-redirect/cross-origin.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/same-origin/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/cross-origin.http.html": [
[
- "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/same-origin/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/cross-origin.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/same-origin/attr-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/cross-origin.http.html": [
[
- "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/same-origin/attr-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/cross-origin.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/same-origin/attr-referrer/cross-origin/http-http/script-tag/no-redirect/cross-origin.http.html": [
[
- "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/same-origin/attr-referrer/cross-origin/http-http/script-tag/no-redirect/cross-origin.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/same-origin/attr-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/cross-origin.http.html": [
[
- "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/same-origin/attr-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/cross-origin.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/same-origin/attr-referrer/cross-origin/http-https/a-tag/no-redirect/cross-origin.http.html": [
[
- "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/same-origin/attr-referrer/cross-origin/http-https/a-tag/no-redirect/cross-origin.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/same-origin/attr-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/cross-origin.http.html": [
[
- "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/same-origin/attr-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/cross-origin.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/same-origin/attr-referrer/cross-origin/http-https/iframe-tag/no-redirect/cross-origin.http.html": [
[
- "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/same-origin/attr-referrer/cross-origin/http-https/iframe-tag/no-redirect/cross-origin.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/same-origin/attr-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/cross-origin.http.html": [
[
- "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/same-origin/attr-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/cross-origin.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/same-origin/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/cross-origin.http.html": [
[
- "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/same-origin/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/cross-origin.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/same-origin/attr-referrer/cross-origin/http-https/img-tag/no-redirect/cross-origin.http.html": [
[
- "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/same-origin/attr-referrer/cross-origin/http-https/img-tag/no-redirect/cross-origin.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/same-origin/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/cross-origin.http.html": [
[
- "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/same-origin/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/cross-origin.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/same-origin/attr-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/cross-origin.http.html": [
[
- "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/same-origin/attr-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/cross-origin.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/same-origin/attr-referrer/cross-origin/http-https/script-tag/no-redirect/cross-origin.http.html": [
[
- "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/same-origin/attr-referrer/cross-origin/http-https/script-tag/no-redirect/cross-origin.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/same-origin/attr-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/cross-origin.http.html": [
[
- "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/same-origin/attr-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/cross-origin.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/same-origin/attr-referrer/same-origin/http-http/a-tag/no-redirect/same-origin-insecure.http.html": [
[
- "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/same-origin/attr-referrer/same-origin/http-http/a-tag/no-redirect/same-origin-insecure.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/same-origin/attr-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/same-origin-insecure.http.html": [
[
- "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/same-origin/attr-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/same-origin-insecure.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/same-origin/attr-referrer/same-origin/http-http/iframe-tag/no-redirect/same-origin-insecure.http.html": [
[
- "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/same-origin/attr-referrer/same-origin/http-http/iframe-tag/no-redirect/same-origin-insecure.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/same-origin/attr-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html": [
[
- "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/same-origin/attr-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/same-origin/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/same-origin-insecure.http.html": [
[
- "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/same-origin/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/same-origin-insecure.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/same-origin/attr-referrer/same-origin/http-http/img-tag/no-redirect/same-origin-insecure.http.html": [
[
- "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/same-origin/attr-referrer/same-origin/http-http/img-tag/no-redirect/same-origin-insecure.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/same-origin/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/same-origin-insecure.http.html": [
[
- "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/same-origin/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/same-origin-insecure.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/same-origin/attr-referrer/same-origin/http-http/script-tag/keep-origin-redirect/same-origin-insecure.http.html": [
[
- "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/same-origin/attr-referrer/same-origin/http-http/script-tag/keep-origin-redirect/same-origin-insecure.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/same-origin/attr-referrer/same-origin/http-http/script-tag/no-redirect/same-origin-insecure.http.html": [
[
- "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/same-origin/attr-referrer/same-origin/http-http/script-tag/no-redirect/same-origin-insecure.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/same-origin/attr-referrer/same-origin/http-http/script-tag/swap-origin-redirect/same-origin-insecure.http.html": [
[
- "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/same-origin/attr-referrer/same-origin/http-http/script-tag/swap-origin-redirect/same-origin-insecure.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/same-origin/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html": [
[
- "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/same-origin/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/same-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html": [
[
- "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/same-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/same-origin/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html": [
[
- "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/same-origin/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/same-origin/http-rp/cross-origin/http-http/a-tag/no-redirect/cross-origin.http.html": [
[
- "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/same-origin/http-rp/cross-origin/http-http/a-tag/no-redirect/cross-origin.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/same-origin/http-rp/cross-origin/http-https/a-tag/no-redirect/cross-origin.http.html": [
[
- "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/same-origin/http-rp/cross-origin/http-https/a-tag/no-redirect/cross-origin.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/same-origin/http-rp/same-origin/http-http/a-tag/no-redirect/same-origin-insecure.http.html": [
[
- "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/same-origin/http-rp/same-origin/http-http/a-tag/no-redirect/same-origin-insecure.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/same-origin/meta-referrer/cross-origin/http-http/a-tag/no-redirect/cross-origin.http.html": [
[
- "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/same-origin/meta-referrer/cross-origin/http-http/a-tag/no-redirect/cross-origin.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/same-origin/meta-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/cross-origin.http.html": [
[
- "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/same-origin/meta-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/cross-origin.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/same-origin/meta-referrer/cross-origin/http-http/img-tag/no-redirect/cross-origin.http.html": [
[
- "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/same-origin/meta-referrer/cross-origin/http-http/img-tag/no-redirect/cross-origin.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/same-origin/meta-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/cross-origin.http.html": [
[
- "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/same-origin/meta-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/cross-origin.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/same-origin/meta-referrer/cross-origin/http-https/a-tag/no-redirect/cross-origin.http.html": [
[
- "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/same-origin/meta-referrer/cross-origin/http-https/a-tag/no-redirect/cross-origin.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/same-origin/meta-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/cross-origin.http.html": [
[
- "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/same-origin/meta-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/cross-origin.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/same-origin/meta-referrer/cross-origin/http-https/img-tag/no-redirect/cross-origin.http.html": [
[
- "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/same-origin/meta-referrer/cross-origin/http-https/img-tag/no-redirect/cross-origin.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/same-origin/meta-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/cross-origin.http.html": [
[
- "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/same-origin/meta-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/cross-origin.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/same-origin/meta-referrer/same-origin/http-http/a-tag/no-redirect/same-origin-insecure.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/same-origin/meta-referrer/same-origin/http-http/a-tag/no-redirect/same-origin-insecure.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/same-origin/meta-referrer/same-origin/http-http/img-tag/keep-origin-redirect/same-origin-insecure.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/same-origin/meta-referrer/same-origin/http-http/img-tag/keep-origin-redirect/same-origin-insecure.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/same-origin/meta-referrer/same-origin/http-http/img-tag/no-redirect/same-origin-insecure.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/same-origin/meta-referrer/same-origin/http-http/img-tag/no-redirect/same-origin-insecure.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/same-origin/meta-referrer/same-origin/http-http/img-tag/swap-origin-redirect/same-origin-insecure.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/same-origin/meta-referrer/same-origin/http-http/img-tag/swap-origin-redirect/same-origin-insecure.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/same-origin/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/same-origin/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/a-tag/no-redirect/cross-insecure.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/a-tag/no-redirect/cross-insecure.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-insecure.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-insecure.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/iframe-tag/no-redirect/cross-insecure.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/iframe-tag/no-redirect/cross-insecure.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-insecure.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-insecure.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/cross-insecure.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/cross-insecure.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/no-redirect/cross-insecure.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/no-redirect/cross-insecure.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/cross-insecure.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/cross-insecure.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/cross-insecure.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/cross-insecure.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/script-tag/no-redirect/cross-insecure.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/script-tag/no-redirect/cross-insecure.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/cross-insecure.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/cross-insecure.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/a-tag/no-redirect/same-insecure.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/a-tag/no-redirect/same-insecure.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/same-insecure.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/same-insecure.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/iframe-tag/no-redirect/same-insecure.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/iframe-tag/no-redirect/same-insecure.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/same-insecure.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/same-insecure.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/same-insecure.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/same-insecure.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/no-redirect/same-insecure.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/no-redirect/same-insecure.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/same-insecure.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/same-insecure.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/script-tag/keep-origin-redirect/same-insecure.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/script-tag/keep-origin-redirect/same-insecure.http.html",
+ {}
+ ]
+ ],
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/script-tag/no-redirect/same-insecure.http.html": [
+ [
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/script-tag/no-redirect/same-insecure.http.html",
+ {}
+ ]
+ ],
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/script-tag/swap-origin-redirect/same-insecure.http.html": [
+ [
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/script-tag/swap-origin-redirect/same-insecure.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/module-worker/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/a-tag/no-redirect/cross-insecure.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/module-worker/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/a-tag/no-redirect/cross-insecure.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/a-tag/no-redirect/same-insecure.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/a-tag/no-redirect/same-insecure.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/a-tag/no-redirect/cross-insecure.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/a-tag/no-redirect/cross-insecure.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/shared-worker/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/cross-insecure.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/shared-worker/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/cross-insecure.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/no-redirect/cross-insecure.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/no-redirect/cross-insecure.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/worker-request/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/cross-insecure.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/worker-request/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/cross-insecure.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/a-tag/no-redirect/same-insecure.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/a-tag/no-redirect/same-insecure.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/img-tag/keep-origin-redirect/same-insecure.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/img-tag/keep-origin-redirect/same-insecure.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/img-tag/no-redirect/same-insecure.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/img-tag/no-redirect/same-insecure.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/img-tag/swap-origin-redirect/same-insecure.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/img-tag/swap-origin-redirect/same-insecure.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin/attr-referrer/same-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin/attr-referrer/same-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin/attr-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin/attr-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin/attr-referrer/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin/attr-referrer/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/strict-origin/attr-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/strict-origin/attr-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/strict-origin/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/strict-origin/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/strict-origin/attr-referrer/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/strict-origin/attr-referrer/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/strict-origin/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/strict-origin/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/strict-origin/attr-referrer/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/strict-origin/attr-referrer/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/strict-origin/attr-referrer/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/strict-origin/attr-referrer/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/strict-origin/attr-referrer/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/strict-origin/attr-referrer/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/strict-origin/attr-referrer/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/strict-origin/attr-referrer/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/strict-origin/attr-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/strict-origin/attr-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/strict-origin/attr-referrer/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/strict-origin/attr-referrer/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/strict-origin/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/strict-origin/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/strict-origin/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/strict-origin/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/strict-origin/attr-referrer/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/strict-origin/attr-referrer/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/strict-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/strict-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/strict-origin/attr-referrer/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/strict-origin/attr-referrer/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/strict-origin/attr-referrer/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/strict-origin/attr-referrer/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin/http-rp/cross-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin/http-rp/cross-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin/http-rp/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin/http-rp/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin/http-rp/same-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin/http-rp/same-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin/http-rp/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin/http-rp/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/module-worker/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/module-worker/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/module-worker/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/module-worker/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/shared-worker/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/shared-worker/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/shared-worker/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/shared-worker/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/worker-request/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin/meta-referrer/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/worker-request/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin/meta-referrer/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/worker-request/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin/meta-referrer/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/worker-request/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin/meta-referrer/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin/meta-referrer/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin/meta-referrer/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html": [
+ "referrer-policy/strict-origin/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html",
+ "referrer-policy/strict-origin/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html": [
+ "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/a-tag/no-redirect/generic.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html",
+ "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/a-tag/no-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/img-tag/no-redirect/generic.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/img-tag/no-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/script-tag/no-redirect/generic.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/script-tag/no-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/a-tag/no-redirect/generic.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/a-tag/no-redirect/generic.http.html",
+ {}
+ ]
+ ],
+ "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html": [
+ [
+ "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html",
+ {}
+ ]
+ ],
+ "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html": [
+ [
+ "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html",
+ {}
+ ]
+ ],
+ "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html": [
+ [
+ "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html",
+ {}
+ ]
+ ],
+ "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html": [
+ [
+ "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html",
+ {}
+ ]
+ ],
+ "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/img-tag/no-redirect/generic.http.html": [
+ [
+ "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/img-tag/no-redirect/generic.http.html",
+ {}
+ ]
+ ],
+ "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html": [
+ [
+ "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html",
+ {}
+ ]
+ ],
+ "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html": [
+ [
+ "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html",
+ {}
+ ]
+ ],
+ "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/script-tag/no-redirect/generic.http.html": [
+ [
+ "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/script-tag/no-redirect/generic.http.html",
+ {}
+ ]
+ ],
+ "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html": [
+ [
+ "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/a-tag/no-redirect/generic.http.html": [
+ [
+ "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/a-tag/no-redirect/generic.http.html",
+ {}
+ ]
+ ],
+ "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html": [
+ [
+ "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html",
+ {}
+ ]
+ ],
+ "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/iframe-tag/no-redirect/generic.http.html": [
+ [
+ "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/iframe-tag/no-redirect/generic.http.html",
+ {}
+ ]
+ ],
+ "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html": [
+ [
+ "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html",
+ {}
+ ]
+ ],
+ "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html": [
+ [
+ "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html",
+ {}
+ ]
+ ],
+ "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/img-tag/no-redirect/generic.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/img-tag/no-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/script-tag/no-redirect/generic.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/script-tag/no-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html",
+ "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html",
{}
]
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html": [
+ "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/a-tag/no-redirect/generic.http.html": [
[
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html",
+ "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/a-tag/no-redirect/generic.http.html",
+ {}
+ ]
+ ],
+ "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html": [
+ [
+ "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html",
+ {}
+ ]
+ ],
+ "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/iframe-tag/no-redirect/generic.http.html": [
+ [
+ "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/iframe-tag/no-redirect/generic.http.html",
+ {}
+ ]
+ ],
+ "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html": [
+ [
+ "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html",
+ {}
+ ]
+ ],
+ "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html": [
+ [
+ "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html",
+ {}
+ ]
+ ],
+ "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/img-tag/no-redirect/generic.http.html": [
+ [
+ "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/img-tag/no-redirect/generic.http.html",
+ {}
+ ]
+ ],
+ "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html": [
+ [
+ "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html",
+ {}
+ ]
+ ],
+ "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html": [
+ [
+ "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html",
+ {}
+ ]
+ ],
+ "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/script-tag/no-redirect/generic.http.html": [
+ [
+ "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/script-tag/no-redirect/generic.http.html",
+ {}
+ ]
+ ],
+ "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html": [
+ [
+ "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html",
+ {}
+ ]
+ ],
+ "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/a-tag/no-redirect/generic.http.html": [
+ [
+ "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/a-tag/no-redirect/generic.http.html",
+ {}
+ ]
+ ],
+ "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/a-tag/no-redirect/generic.http.html": [
+ [
+ "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/a-tag/no-redirect/generic.http.html",
+ {}
+ ]
+ ],
+ "referrer-policy/unsafe-url/http-rp/same-origin/http-http/a-tag/no-redirect/generic.http.html": [
+ [
+ "referrer-policy/unsafe-url/http-rp/same-origin/http-http/a-tag/no-redirect/generic.http.html",
+ {}
+ ]
+ ],
+ "referrer-policy/unsafe-url/http-rp/same-origin/http-https/a-tag/no-redirect/generic.http.html": [
+ [
+ "referrer-policy/unsafe-url/http-rp/same-origin/http-https/a-tag/no-redirect/generic.http.html",
+ {}
+ ]
+ ],
+ "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/a-tag/no-redirect/generic.http.html": [
+ [
+ "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/a-tag/no-redirect/generic.http.html",
+ {}
+ ]
+ ],
+ "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html": [
+ [
+ "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html",
+ {}
+ ]
+ ],
+ "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/img-tag/no-redirect/generic.http.html": [
+ [
+ "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/img-tag/no-redirect/generic.http.html",
+ {}
+ ]
+ ],
+ "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html": [
+ [
+ "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html",
+ {}
+ ]
+ ],
+ "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/a-tag/no-redirect/generic.http.html": [
+ [
+ "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/a-tag/no-redirect/generic.http.html",
+ {}
+ ]
+ ],
+ "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html": [
+ [
+ "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html",
+ {}
+ ]
+ ],
+ "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/img-tag/no-redirect/generic.http.html": [
+ [
+ "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/img-tag/no-redirect/generic.http.html",
+ {}
+ ]
+ ],
+ "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html": [
+ [
+ "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html",
+ {}
+ ]
+ ],
+ "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/a-tag/no-redirect/generic.http.html": [
+ [
+ "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/a-tag/no-redirect/generic.http.html",
+ {}
+ ]
+ ],
+ "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html": [
+ [
+ "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html",
+ {}
+ ]
+ ],
+ "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/img-tag/no-redirect/generic.http.html": [
+ [
+ "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/img-tag/no-redirect/generic.http.html",
+ {}
+ ]
+ ],
+ "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html": [
+ [
+ "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html",
+ {}
+ ]
+ ],
+ "referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/a-tag/no-redirect/generic.http.html": [
+ [
+ "referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/a-tag/no-redirect/generic.http.html",
+ {}
+ ]
+ ],
+ "referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html": [
+ [
+ "referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html",
+ {}
+ ]
+ ],
+ "referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/img-tag/no-redirect/generic.http.html": [
+ [
+ "referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/img-tag/no-redirect/generic.http.html",
+ {}
+ ]
+ ],
+ "referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html": [
+ [
+ "referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html",
+ {}
+ ]
+ ],
+ "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html": [
+ [
+ "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html",
+ {}
+ ]
+ ],
+ "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
+ [
+ "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html",
+ {}
+ ]
+ ],
+ "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html": [
+ [
+ "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html",
+ {}
+ ]
+ ],
+ "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
+ [
+ "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html",
+ {}
+ ]
+ ],
+ "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html": [
+ [
+ "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html",
+ {}
+ ]
+ ],
+ "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ [
+ "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html",
+ {}
+ ]
+ ],
+ "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html": [
+ [
+ "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html",
+ {}
+ ]
+ ],
+ "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ [
+ "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html",
+ {}
+ ]
+ ],
+ "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
+ [
+ "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html",
+ {}
+ ]
+ ],
+ "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ [
+ "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ {}
+ ]
+ ],
+ "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
+ [
+ "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html",
+ {}
+ ]
+ ],
+ "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ [
+ "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html",
+ {}
+ ]
+ ],
+ "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html": [
+ [
+ "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html",
+ {}
+ ]
+ ],
+ "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ [
+ "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html",
+ {}
+ ]
+ ],
+ "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html": [
+ [
+ "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html",
+ {}
+ ]
+ ],
+ "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ [
+ "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html",
+ {}
+ ]
+ ],
+ "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
+ [
+ "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html",
+ {}
+ ]
+ ],
+ "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ [
+ "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html",
+ {}
+ ]
+ ],
+ "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
+ [
+ "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html",
+ {}
+ ]
+ ],
+ "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ [
+ "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html",
{}
]
],
@@ -404158,6 +404198,12 @@
{}
]
],
+ "svg/animations/beginelement-instance-time-1.html": [
+ [
+ "svg/animations/beginelement-instance-time-1.html",
+ {}
+ ]
+ ],
"svg/animations/change-css-property-while-animating-fill-freeze.html": [
[
"svg/animations/change-css-property-while-animating-fill-freeze.html",
@@ -406373,6 +406419,24 @@
}
]
],
+ "trusted-types/trusted-types-eval-reporting-no-unsafe-eval.tentative.https.html": [
+ [
+ "trusted-types/trusted-types-eval-reporting-no-unsafe-eval.tentative.https.html",
+ {}
+ ]
+ ],
+ "trusted-types/trusted-types-eval-reporting-report-only.tentative.https.html": [
+ [
+ "trusted-types/trusted-types-eval-reporting-report-only.tentative.https.html",
+ {}
+ ]
+ ],
+ "trusted-types/trusted-types-eval-reporting.tentative.https.html": [
+ [
+ "trusted-types/trusted-types-eval-reporting.tentative.https.html",
+ {}
+ ]
+ ],
"trusted-types/trusted-types-report-only.tentative.https.html": [
[
"trusted-types/trusted-types-report-only.tentative.https.html",
@@ -451026,7 +451090,7 @@
"testharness"
],
"IndexedDB/idbobjectstore_createIndex15-autoincrement.htm": [
- "87ea39ce3d240c38359c17b324b11a08441368ee",
+ "c66b81548adb1ef287b2ba075e66d6dbb8e6360b",
"testharness"
],
"IndexedDB/idbobjectstore_createIndex2.htm": [
@@ -451477,6 +451541,10 @@
"28836448aca6925b4860f85b52c6c0dbac0214c9",
"testharness"
],
+ "IndexedDB/transaction-relaxed-durability.tentative.any.js": [
+ "c6a6f37ba9e0b29dc17fe66e487920acf2c4ecc6",
+ "testharness"
+ ],
"IndexedDB/transaction-requestqueue.htm": [
"9f28e81ea8a65013f4ba9a1992aaff8598418f5f",
"testharness"
@@ -455750,167 +455818,167 @@
"support"
],
"bluetooth/adapter/adapter-absent-getAvailability.https.window.js": [
- "cec09c38b138653297ee1df6ab0811a0575978bc",
+ "a9f540ecd34331271e27b99f74e155f40b41f6ec",
"testharness"
],
"bluetooth/adapter/adapter-added-getAvailability.https.window.js": [
- "d5e9d1f2b6ffbb009b03d0cde8155144aeee630b",
+ "30c47201f072206e548cc5ea3417c91383fffcc7",
"testharness"
],
"bluetooth/adapter/adapter-powered-off-getAvailability.https.window.js": [
- "8fe9265a46ed22a9bb0e0480f045135b323565f0",
+ "b760d4bc2728212a025b7d8fd1a34c002e62840b",
"testharness"
],
"bluetooth/adapter/adapter-powered-on-getAvailability.https.window.js": [
- "8b9256a4c35680722ad2ee00784de6649b703611",
+ "f98a88eea9e1d2e0adb21d616802931af09c2481",
"testharness"
],
"bluetooth/adapter/adapter-powered-on-off-on-getAvailability.https.window.js": [
- "b8b49121fc0170eb9dc95614b5c3b19ef16bd02b",
+ "ac664a8981267007ada522bfd610209995dbfe16",
"testharness"
],
"bluetooth/adapter/adapter-removed-getAvailability.https.window.js": [
- "cc2c33d1d4c2bf2cdad0cd0874a739b462ff90ec",
+ "00425aa56f25fb208503c46cb12a2f422ee141f5",
"testharness"
],
"bluetooth/adapter/cross-origin-iframe-getAvailability.sub.https.window.js": [
- "bf5e4226e08d44e521b533f020c0deaa95851983",
+ "ce633c63f981921cbb9ea2ab5f2f71a839cb8acb",
"testharness"
],
"bluetooth/characteristic/characteristicProperties.https.window.js": [
- "abe9f79ce26ed7cc9f5c17cfd2f0e1e70d1d3657",
+ "5239accab97942ea1ff8e1cccd3bc383977e915d",
"testharness"
],
"bluetooth/characteristic/getDescriptor/gen-characteristic-is-removed.https.window.js": [
- "97256a4533007d9c52ec395ba5a811c212aaf48c",
+ "eb91e972c4e537f6eea30c844358ef4a30d911eb",
"testharness"
],
"bluetooth/characteristic/getDescriptor/gen-descriptor-get-same-object.https.window.js": [
- "8847efab3c1565150110155f3fcbf11c54003846",
+ "4cff64bbdad180314b76784ea4f0720ba6df83fd",
"testharness"
],
"bluetooth/characteristic/getDescriptor/gen-service-is-removed.https.window.js": [
- "b9dc92482ab6f4f564c322c2fa9b19198e576e33",
+ "f5d1761994abc3800dbc6e62ee4357fbceeb26f5",
"testharness"
],
"bluetooth/characteristic/getDescriptors/gen-characteristic-is-removed-with-uuid.https.window.js": [
- "25bde7cecc5fbfa7d83bf5fd5c29f551598a2d43",
+ "7405a8ee6e3a5fc4a78061b30f98608b2946f545",
"testharness"
],
"bluetooth/characteristic/getDescriptors/gen-characteristic-is-removed.https.window.js": [
- "c3ff9f6a05c625da3ffc4ab5bdab3a6bab82f524",
+ "470f7043be314bf6e7c0678806c948cb0591e2ed",
"testharness"
],
"bluetooth/characteristic/getDescriptors/gen-descriptor-get-same-object.https.window.js": [
- "c997d7afda2c1faef8fe2e33ac430286334edd4d",
+ "1dc58aea155206df60f567bbba3560887d6f24a0",
"testharness"
],
"bluetooth/characteristic/getDescriptors/gen-service-is-removed-with-uuid.https.window.js": [
- "03bb51239dccd4ca479f8159052086c2c0c1c285",
+ "5ee7e0d24943bc939ee2a2b9bbf7940d212d1218",
"testharness"
],
"bluetooth/characteristic/getDescriptors/gen-service-is-removed.https.window.js": [
- "762f9cc99554aa206f7cf4c767c2db5dbdb0634c",
+ "24a2087e938fed32a63c9b0fed8ca20b437be6b4",
"testharness"
],
"bluetooth/characteristic/notifications/characteristic-is-removed.https.window.js": [
- "6b5d3e22a121e64c75e217e73631c7cd6ad86865",
+ "2ab165d9044520d62f4d4fb334b4f148c865ecab",
"testharness"
],
"bluetooth/characteristic/notifications/service-is-removed.https.window.js": [
- "29bc671c5d4c9e27e4fc59b4dee520a494770cd8",
+ "d2456934d83dc75720dff84429932a157094cf56",
"testharness"
],
"bluetooth/characteristic/readValue/add-multiple-event-listeners.https.window.js": [
- "7e6e4159bb11234b01162b3daf080143c0055252",
+ "13709ea941ed5ca54f6b2e38d4017afa3c9995c2",
"testharness"
],
"bluetooth/characteristic/readValue/characteristic-is-removed.https.window.js": [
- "07678e6e037b211ee9560a6c1af02465e7cc4e11",
+ "269f2cb4a1f010a972a156090763ebb152fcb5c2",
"testharness"
],
"bluetooth/characteristic/readValue/event-is-fired.https.window.js": [
- "eee34d0612d3611121d219c0b4098937df507ece",
+ "03b8f2b4cee8ec0c77630d15dbb7df711921f6c4",
"testharness"
],
"bluetooth/characteristic/readValue/gen-characteristic-is-removed.https.window.js": [
- "a2de3c39e20626b617926618da10acfb5f81a83d",
+ "26efe8b306b4a99e7ac4a34f153c1b909f029cf7",
"testharness"
],
"bluetooth/characteristic/readValue/read-succeeds.https.window.js": [
- "aeece7d11f480e5cf7122ef97bc9eb098a7da883",
+ "82be128f31242ccc55a761c09a992a1132064faa",
"testharness"
],
"bluetooth/characteristic/readValue/read-updates-value.https.window.js": [
- "45da8af25020374c8b876984017fbefc95f4b8f1",
+ "34da455ddff4a91ee16f969b096f7821fb2d00bc",
"testharness"
],
"bluetooth/characteristic/readValue/service-is-removed.https.window.js": [
- "07e9701d3c321dfdf166195ec4eab6c2f354f216",
+ "20dd4ba1c05e5850f16234d693c32dab0350bd4e",
"testharness"
],
"bluetooth/characteristic/service-same-from-2-characteristics.https.window.js": [
- "e3bc5d0e103d66368db4b294e3e09d8a9018b792",
+ "b34b3b9216abec77727dcda84a83e07f3eedb210",
"testharness"
],
"bluetooth/characteristic/service-same-object.https.window.js": [
- "6b1f543ae5e9944d4792a01209417016f4566a2e",
+ "b58902ae51957b91ee63eb4f53acd1c0e353f7ef",
"testharness"
],
"bluetooth/characteristic/startNotifications/gen-characteristic-is-removed.https.window.js": [
- "76b2d42a481f1f73ba869e2350627c080531bf7e",
+ "af27f933d8f10207caf1574befa6d9f64767fc45",
"testharness"
],
"bluetooth/characteristic/writeValue/buffer-is-detached.https.window.js": [
- "35347e3bcf8fdc3c895e6daea5d9b7247cbcfcac",
+ "cefbb6ee8c349d80d0dd8bc20fe370a771d02916",
"testharness"
],
"bluetooth/characteristic/writeValue/characteristic-is-removed.https.window.js": [
- "33a963bed0950485a06685df8a601025bd4c419c",
+ "c0f5a3e6509c91efb5dae8cb9a3b07875ab6051b",
"testharness"
],
"bluetooth/characteristic/writeValue/gen-characteristic-is-removed.https.window.js": [
- "00c50894e5bb1e444ecc02c441d6bd6343ccdd58",
+ "d5ac10fc611443cdde02761448e6f479390bf790",
"testharness"
],
"bluetooth/characteristic/writeValue/service-is-removed.https.window.js": [
- "a9f812c137f236ac088fbf42886c44e92eabafc4",
+ "e7a2837c389a1076b548dc5256fe78eaa1059162",
"testharness"
],
"bluetooth/characteristic/writeValue/write-succeeds.https.window.js": [
- "1472c619a2dbdf5c8536e240ff024349a6e938ea",
+ "cdda9cec345b81297966b74ab2152f02010ec6b7",
"testharness"
],
"bluetooth/descriptor/readValue/gen-service-is-removed.https.window.js": [
- "3b6c78a97c586fd02da2ccd53c81291b79512f8c",
+ "aa95687094b50340503d8cc5bcdeaec7e5bf3bdf",
"testharness"
],
"bluetooth/descriptor/readValue/read-succeeds.https.window.js": [
- "5f3c5f8f084c11639ea86f7332d03f56e7c72b4e",
+ "fc1facaf58e37550c4fb9a4d5b66f2180072cbe8",
"testharness"
],
"bluetooth/descriptor/writeValue/buffer-is-detached.https.window.js": [
- "23ea2329a64f4da8a4cc5cd4a9de7ed0a7b6047e",
+ "2ff277ec9496e73961c9f8efa903f465d2fa776b",
"testharness"
],
"bluetooth/descriptor/writeValue/gen-service-is-removed.https.window.js": [
- "ca75ebaba8867c0ede9ed743537ace2b702f095d",
+ "a486819b55a114e9e4bbde31b709cf00c7aae1c5",
"testharness"
],
"bluetooth/device/gattserverdisconnected-event/disconnected.https.window.js": [
- "245e43d31504a555af42971b87978a4f48c949a2",
+ "dab54d5da2961eae72d6bd05eb15023dd8a2a46a",
"testharness"
],
"bluetooth/device/gattserverdisconnected-event/disconnected_gc.https.window.js": [
- "69e30443ee6f505fbd2a4623457251ac564bcb4b",
+ "a15cc943f4e1180ea092e24db9112658b40c5b99",
"testharness"
],
"bluetooth/device/gattserverdisconnected-event/one-event-per-disconnection.https.window.js": [
- "317eddee9ba86d6b1357ce6a845b2b99c78d15da",
+ "f5e45f99755dbd05f24cbca9584d67e5e6654c32",
"testharness"
],
"bluetooth/device/gattserverdisconnected-event/reconnect-during-disconnected-event.https.window.js": [
- "93a46eeb934f0ebef9ff378ed7f9e59379d9d094",
+ "8f264c7b02524a84ac67e6fbe343045ae8eb07a6",
"testharness"
],
"bluetooth/generate.py": [
@@ -456106,7 +456174,7 @@
"support"
],
"bluetooth/script-tests/base_test_js.template": [
- "56971d2c6c98faaf479f3a89fb0757e85bf9b42c",
+ "c0fa4aed552db72575b8344c7e495680eac84916",
"support"
],
"bluetooth/script-tests/characteristic/characteristic-is-removed.js": [
@@ -456250,67 +456318,67 @@
"testharness"
],
"bluetooth/server/getPrimaryService/gen-disconnect-called-before.https.window.js": [
- "2d94b41e0207689824be914a21ef7fab4f866d10",
+ "1eb62d3a3118e9c63decb6d82aeb0aa906e396f3",
"testharness"
],
"bluetooth/server/getPrimaryService/gen-disconnect-called-during-error.https.window.js": [
- "0d6e8a7a179070c7d4a023ad550d8b25f3a3bcdf",
+ "c7c80244193016db84dbbf8e9f3441e2a4937b96",
"testharness"
],
"bluetooth/server/getPrimaryService/gen-disconnect-called-during-success.https.window.js": [
- "18af59d7f803a5a7adbcf1658a4449302b5d8291",
+ "5655d8ee41cd1765f105772f42dcacfcf0a27e6f",
"testharness"
],
"bluetooth/server/getPrimaryService/gen-disconnect-invalidates-objects.https.window.js": [
- "5cfe893f5d81ca2a6c07ec02e4c29ab96b594175",
+ "c95f8b921a74eeedf06f8c987bd233ca97c060fb",
"testharness"
],
"bluetooth/server/getPrimaryService/gen-disconnected-device.https.window.js": [
- "622f2cf3212cf66f11545e157e0fa389c7f5f3d8",
+ "e610b715b3aae554bec472cc5fcc74d3fc4fb7ad",
"testharness"
],
"bluetooth/server/getPrimaryService/gen-discovery-complete-no-permission-absent-service.https.window.js": [
- "5afb0262658249caee332d8988f62a5da8829865",
+ "ee3cf97f4db9f68cffac91c55bf282ab54b8906b",
"testharness"
],
"bluetooth/server/getPrimaryService/gen-discovery-complete-service-not-found.https.window.js": [
- "86fa5e9b011b8c4c08ffad135a5e893c138c4e4b",
+ "5bf720cd48eb0eeec5f89488384f078ce37c9cd6",
"testharness"
],
"bluetooth/server/getPrimaryService/gen-garbage-collection-ran-during-error.https.window.js": [
- "2c35c1b7556297c4d595f451662ed6df7d09df77",
+ "4c3111720c2c69d8e5e867bf4a3288ea1aba8115",
"testharness"
],
"bluetooth/server/getPrimaryService/gen-garbage-collection-ran-during-success.https.window.js": [
- "cca8c2c5d2f2bf0c5f758b4299d54ca2a1f76e4d",
+ "fe7d749063d8d75da9c389fffbe9dc68af9a30a2",
"testharness"
],
"bluetooth/server/getPrimaryService/gen-get-different-service-after-reconnection.https.window.js": [
- "a0f073d8a314ea9574a9187a6b97c39fd7c1fdad",
+ "301658c73bb8e4db78433c4072b83aa5f99d629a",
"testharness"
],
"bluetooth/server/getPrimaryService/gen-get-same-object.https.window.js": [
- "3deb387406e4fd197890422d77c1b0e288b9ad3a",
+ "c46a1a52c031373b16718d3687a013109f45da62",
"testharness"
],
"bluetooth/server/getPrimaryService/gen-invalid-service-name.https.window.js": [
- "d59e202d71cc3d4b8876ebbdef188170fdaa339f",
+ "704ab8bb2dac944d1a3e2a33b57c225edc994225",
"testharness"
],
"bluetooth/server/getPrimaryService/gen-no-permission-absent-service.https.window.js": [
- "89ca46884478194b5e0b447bbe51810ea8217cd7",
+ "8daab29eaf94bbae9e28a921a5a650f858ccdd7a",
"testharness"
],
"bluetooth/server/getPrimaryService/gen-no-permission-for-any-service.https.window.js": [
- "fec0055dcdb7ab1c11b44388d2ea4b2972e19910",
+ "d55dee753cf8b000089f1d8a5a21f383587427cd",
"testharness"
],
"bluetooth/server/getPrimaryService/gen-no-permission-present-service.https.window.js": [
- "a0161a0446b37b00ba351eaff67ba5f6c4a53cda",
+ "d357a214dfd68723571c014d29f8f2e65773a245",
"testharness"
],
"bluetooth/server/getPrimaryService/gen-service-not-found.https.window.js": [
- "60fb4f2c529443eb06e28118cf506d5fff12bfd8",
+ "32350e779dce890573bcf519ac74023818296f3e",
"testharness"
],
"bluetooth/server/getPrimaryService/service-found.https.html": [
@@ -456334,107 +456402,107 @@
"testharness"
],
"bluetooth/server/getPrimaryServices/gen-disconnect-called-before-with-uuid.https.window.js": [
- "86a346d14839efc6a5baa913c430328517780d67",
+ "ad446499cbabf6efa98a8d4fb65aeebc1dc22da5",
"testharness"
],
"bluetooth/server/getPrimaryServices/gen-disconnect-called-before.https.window.js": [
- "97e9f77d12e668021ca6303eb669666ec16b787d",
+ "485dbb30421e31108e256cd2f7a57ad2a27bfab5",
"testharness"
],
"bluetooth/server/getPrimaryServices/gen-disconnect-called-during-error-with-uuid.https.window.js": [
- "37394075d80cf113bec492d02c48e7e2ba394651",
+ "230325a8c76169a545010fb784999599e77463ad",
"testharness"
],
"bluetooth/server/getPrimaryServices/gen-disconnect-called-during-error.https.window.js": [
- "9c7aac67a4a3e1fba531a817973daf211e5e9fab",
+ "dce13c5d0065b26c082d042cb92c0cc2ac01f63e",
"testharness"
],
"bluetooth/server/getPrimaryServices/gen-disconnect-called-during-success-with-uuid.https.window.js": [
- "bffcea4e9fb3b1e6367bbc353f36dd4ccd7d3855",
+ "8e2e32ba4fddc843378c901e0ce933c54105a539",
"testharness"
],
"bluetooth/server/getPrimaryServices/gen-disconnect-called-during-success.https.window.js": [
- "162a61f3eb5f15a1b152eb8d6d4d3b0463beea3c",
+ "78dcffdcbb1861df8cfd7dc6108b40bbb9f57d1e",
"testharness"
],
"bluetooth/server/getPrimaryServices/gen-disconnect-invalidates-objects-with-uuid.https.window.js": [
- "05dce42424d02d7dd6a47d867189be3fdd827ea3",
+ "d9f61674671bf0c31776af26c6c477578e6760b6",
"testharness"
],
"bluetooth/server/getPrimaryServices/gen-disconnect-invalidates-objects.https.window.js": [
- "e17162a71987c291060199dd156e64033d6829b7",
+ "b1c9688cc14e68069eac95e8a9b1cc272cf1f527",
"testharness"
],
"bluetooth/server/getPrimaryServices/gen-disconnected-device-with-uuid.https.window.js": [
- "3bfa60d8ccb3e6e5403b06d0d1d1fa82a52fc284",
+ "8d64dafb760e2d04d4d9dd3c2f9db7e167ffe718",
"testharness"
],
"bluetooth/server/getPrimaryServices/gen-disconnected-device.https.window.js": [
- "7072b3efb1f7aeeb8d07eb2c5ff01f045859dad4",
+ "9c411120a0446017e85ce151b96f31bdabb9b8f9",
"testharness"
],
"bluetooth/server/getPrimaryServices/gen-discovery-complete-no-permission-absent-service-with-uuid.https.window.js": [
- "589ebe386444f2f50820034a737c8a30cdbe5060",
+ "130657d228f4c7cada6d27a2ad8ff7fee403d9e0",
"testharness"
],
"bluetooth/server/getPrimaryServices/gen-discovery-complete-service-not-found-with-uuid.https.window.js": [
- "15b8b978040129b6bc416d838b317ca97fc1219b",
+ "3817a1a5a38723ce08e1650155c5fcd81ff54bdb",
"testharness"
],
"bluetooth/server/getPrimaryServices/gen-garbage-collection-ran-during-error-with-uuid.https.window.js": [
- "17495d24ebadcd9752b06201a7035f45cfcb3635",
+ "c986835ce31dcf5049e54bf553c3b12dac7151d5",
"testharness"
],
"bluetooth/server/getPrimaryServices/gen-garbage-collection-ran-during-error.https.window.js": [
- "741cd2171f894c99bdfa9fa506a62e1bd2488218",
+ "bd438db09e350a0d7ee330a6c3eaa54f1fea02ba",
"testharness"
],
"bluetooth/server/getPrimaryServices/gen-garbage-collection-ran-during-success-with-uuid.https.window.js": [
- "1ee4f21ccba63ef5806840934248c7a6d6def35f",
+ "3b441cedeff36c6b854bc4ea4e7952eac6284d1a",
"testharness"
],
"bluetooth/server/getPrimaryServices/gen-garbage-collection-ran-during-success.https.window.js": [
- "285b774c4e70557f8f14b05c4d9de2b8276a945f",
+ "1b3302a1ba6ffe049e44228280c652bf74310a50",
"testharness"
],
"bluetooth/server/getPrimaryServices/gen-get-different-service-after-reconnection-with-uuid.https.window.js": [
- "eb20e6f4b2f8fc2193b2f566eb8b7952747c495c",
+ "378ade0c90b5d7c49c31bb58efaa835b4c502d95",
"testharness"
],
"bluetooth/server/getPrimaryServices/gen-get-different-service-after-reconnection.https.window.js": [
- "14fc656c70dd4352aa4d2ab53e98015dd2704978",
+ "bdef5aa2f20ae4971784a566135ecc6b71fc03ca",
"testharness"
],
"bluetooth/server/getPrimaryServices/gen-get-same-object-with-uuid.https.window.js": [
- "f3fc4906b44eec68feebcd289320a54fba682246",
+ "aca34e58ff06dd92d15b0bb1d09f81aa8c77402c",
"testharness"
],
"bluetooth/server/getPrimaryServices/gen-get-same-object.https.window.js": [
- "c7c488a18b9413e488680b431361981beacb5c1a",
+ "0ea805e339d4dff1dea445e99cc8d661a7f8404a",
"testharness"
],
"bluetooth/server/getPrimaryServices/gen-invalid-service-name.https.window.js": [
- "025f1ccdf7c832343d6631e7a85452f7390c5c16",
+ "eeb6dd4dcf867345ff4cfad28b19a9ffa3fb509b",
"testharness"
],
"bluetooth/server/getPrimaryServices/gen-no-permission-absent-service-with-uuid.https.window.js": [
- "6f1bb251723a6fda193fe3f0428d730da416506c",
+ "c755dd7129df5ac3825e07d7c7b3d11e2a227f12",
"testharness"
],
"bluetooth/server/getPrimaryServices/gen-no-permission-for-any-service-with-uuid.https.window.js": [
- "4bbddeae56ef7fa18656133191abc0e6b2bce1ca",
+ "03b7f2329c8d90fb326bf851c5275f42d2dc2007",
"testharness"
],
"bluetooth/server/getPrimaryServices/gen-no-permission-for-any-service.https.window.js": [
- "40b8b576ff4fc57b53a544a5c863985630bbe5ea",
+ "e50c6d56128489fdde8475979ff8868f41d365a1",
"testharness"
],
"bluetooth/server/getPrimaryServices/gen-no-permission-present-service-with-uuid.https.window.js": [
- "6f737ecf889d9f96c0e28851c2eb9f5782522fd9",
+ "c703d0a936394d951a84d03ace7bc0b4d80abc7c",
"testharness"
],
"bluetooth/server/getPrimaryServices/gen-service-not-found-with-uuid.https.window.js": [
- "33946d281bd8219f4dd07a7a2166f626187c10cf",
+ "9dc1877f9f2753862d106c4dad9830fddd6898f4",
"testharness"
],
"bluetooth/server/getPrimaryServices/services-found-with-uuid.https.html": [
@@ -456462,31 +456530,31 @@
"testharness"
],
"bluetooth/service/getCharacteristic/gen-blocklisted-characteristic.https.window.js": [
- "04176f1ecdadcdfa6214468973d9d52c2f074c90",
+ "72b9bac63a437b7367f10e772f4f598d491b2823",
"testharness"
],
"bluetooth/service/getCharacteristic/gen-characteristic-not-found.https.window.js": [
- "cfec509c49205dd407cfe5b114800d1c65f87c8a",
+ "a8b2ef892c768476675c79f70fb3d546d019c4b1",
"testharness"
],
"bluetooth/service/getCharacteristic/gen-garbage-collection-ran-during-error.https.window.js": [
- "9543a5e56337ad970a2ab29ef7d2cd2b3ad5c584",
+ "7457161faa09235acfdc609df7e8e4d39fa4ebf7",
"testharness"
],
"bluetooth/service/getCharacteristic/gen-get-same-object.https.window.js": [
- "73691befa52f79c6739f2e1763569afce4a61c46",
+ "54ab061deb9eb522dbed1f3d95d1ad485a26ea04",
"testharness"
],
"bluetooth/service/getCharacteristic/gen-invalid-characteristic-name.https.window.js": [
- "d21dcf561224906c05e7dacd323f81bab7e408d1",
+ "8f44ecb08be4ff6ec2cc563b32038622dfc8f26d",
"testharness"
],
"bluetooth/service/getCharacteristic/gen-reconnect-during.https.window.js": [
- "6f86214246457a68fe383ff2aa148f533f547a72",
+ "da5462a8bfa53a7a124a87c46fe9d30c7aedb83b",
"testharness"
],
"bluetooth/service/getCharacteristic/gen-service-is-removed.https.window.js": [
- "b6d6a9df96e73b53008c2655bf524c0d1fe2f687",
+ "0fe5b01146ebbc57172435dfe49e887ac6ad2d1b",
"testharness"
],
"bluetooth/service/getCharacteristics/blocklisted-characteristics.https.html": [
@@ -456506,47 +456574,47 @@
"testharness"
],
"bluetooth/service/getCharacteristics/gen-blocklisted-characteristic-with-uuid.https.window.js": [
- "3afd294d5b12755b4401287d2ff818e4c50f7f38",
+ "cd8a6fa380aade14eb256fb8440d15b6e7352ca2",
"testharness"
],
"bluetooth/service/getCharacteristics/gen-characteristic-not-found-with-uuid.https.window.js": [
- "549f6b2671940e0a132fa3b2123ae24be9a912c7",
+ "fff2bd038a82698748acadaa3e85047bd77c79f1",
"testharness"
],
"bluetooth/service/getCharacteristics/gen-garbage-collection-ran-during-error-with-uuid.https.window.js": [
- "643e2f839efabbc2e907e20b062903e13dc2be92",
+ "925786c74deab9ad66080391652b60eba00598ee",
"testharness"
],
"bluetooth/service/getCharacteristics/gen-garbage-collection-ran-during-error.https.window.js": [
- "b7db67f613f65f43dcb078740302d2fed08c4ded",
+ "d0ecff89f706b1bb4251232a369ea45b70e2e517",
"testharness"
],
"bluetooth/service/getCharacteristics/gen-get-same-object-with-uuid.https.window.js": [
- "15b552af4913a45235ac196111692764f07691ef",
+ "fb3346dc4e4c1ca8cb601c41e8f120ccfdb149c3",
"testharness"
],
"bluetooth/service/getCharacteristics/gen-get-same-object.https.window.js": [
- "df30d514f39adaa3e6d42747cf7c13a247011992",
+ "576e0831501faa8b838081a96ef437abda2ed668",
"testharness"
],
"bluetooth/service/getCharacteristics/gen-invalid-characteristic-name.https.window.js": [
- "f980ac03d5f4e5c2c9e1036eda709245c2836d27",
+ "5b2bd39d3e052cb689bc2f668e87515563d4fa33",
"testharness"
],
"bluetooth/service/getCharacteristics/gen-reconnect-during-with-uuid.https.window.js": [
- "eb4233764aaadc4389ebe9518b1eb89c882ce68c",
+ "95f22b11fcf8a5237c7bf0c2b3c40a3d2932b5be",
"testharness"
],
"bluetooth/service/getCharacteristics/gen-reconnect-during.https.window.js": [
- "a6d38805973a7638c36dfd09af6d566280576b44",
+ "184632f1d0581e76aed99bcb9a645c837b88af1f",
"testharness"
],
"bluetooth/service/getCharacteristics/gen-service-is-removed-with-uuid.https.window.js": [
- "527eb76527696505dde06078b11985499cb74ed1",
+ "6ff7b4f3631e669cf192e3864fe5bbef1d27f23c",
"testharness"
],
"bluetooth/service/getCharacteristics/gen-service-is-removed.https.window.js": [
- "466503241ed098f063b59b6317e112434ac04c47",
+ "b4492885b83016d719161f705a33f7ada8a6d9c2",
"testharness"
],
"check_stability.ini": [
@@ -456954,11 +457022,11 @@
"support"
],
"common/security-features/README.md": [
- "a2ae9aa8e16bcd30328a37721d7ec7adf5ebbfbf",
+ "deac1ccd8953beccee632625690275d2fa180b8c",
"support"
],
"common/security-features/resources/common.js": [
- "7afa6068bf427641fb09a4b6f84f4cc9ba70e420",
+ "6986f841a8827226b38745722a38ace4b0e3ea46",
"support"
],
"common/security-features/resources/common.js.headers": [
@@ -457078,11 +457146,11 @@
"support"
],
"common/security-features/tools/generate.py": [
- "0b18a391a62279680e2cbb6905d41084a622f236",
+ "0cf7fab42ec199b5f93926a5133ff149bff93c8c",
"support"
],
"common/security-features/tools/spec_validator.py": [
- "2c9664788699676a27e2715344ba581f35c89ad7",
+ "fff4c5dd6f688a733c1a48c5fe818f7f2979c8dd",
"support"
],
"common/security-features/tools/template/disclaimer.template": [
@@ -457102,7 +457170,7 @@
"support"
],
"common/security-features/tools/util.py": [
- "fc8d3b30ef71ca3b63c325837cf58f768f5805f4",
+ "57e95fea0784d94452b7bb437c5ddebedd95c721",
"support"
],
"common/sleep.py": [
@@ -546994,27 +547062,27 @@
"reftest"
],
"css/css-contain/contain-size-replaced-004-ref.html": [
- "eba5e8cb9a81b14895af3e6a9b5b2f425e23d74a",
+ "56ca5d2e50e73e38f57c4b4332c8bf02225502d2",
"support"
],
"css/css-contain/contain-size-replaced-004.html": [
- "511edadc4f8f1130802b2c179448bad6e7552593",
+ "9f84481504660e4129f10532c761b04fc2030f3f",
"reftest"
],
"css/css-contain/contain-size-replaced-005-ref.html": [
- "a5328c79ac60e24fc05f8c8027247ad9fb8d619c",
+ "178e137cb72a1dec8724265e23ccf8b1820e7628",
"support"
],
"css/css-contain/contain-size-replaced-005.html": [
- "e889dcc903cc47f4fc59cd65ab313912b8d6e72c",
+ "754f3608e3a8bf17cbfa12cd7418e12f79f12fa0",
"reftest"
],
"css/css-contain/contain-size-replaced-006-ref.html": [
- "2f638d7fe428efe8f326a1ba34337853243d6937",
+ "d6753c0694b1ae145f50c39cee1ec64abdf2ea5e",
"support"
],
"css/css-contain/contain-size-replaced-006.html": [
- "dccb799ea87433e0442539e11c3a5934e4b59e2e",
+ "f716ce42a89202a9a4209fed18de407d8ed15ce7",
"reftest"
],
"css/css-contain/contain-size-scrollbars-001.html": [
@@ -547393,6 +547461,14 @@
"a5b4e9f47a8e60ad0bede1ac81e02b3542c80f3b",
"support"
],
+ "css/css-contain/support/60x60-green.png": [
+ "b3c8cf3eb4c89bd8f2d1ffde051856f375e3a3de",
+ "support"
+ ],
+ "css/css-contain/support/60x60-red.png": [
+ "823f125b8e4a60f780f00443c9c9a10b9fa1f447",
+ "support"
+ ],
"css/css-contain/support/blue-100x100.png": [
"3b72d5ce53c07b68fe508bb57aa61a933dbda768",
"support"
@@ -550761,6 +550837,10 @@
"fb897f21c67dcb630c5eac346687b78f8f5e244a",
"reftest"
],
+ "css/css-flexbox/flex-wrap-006.html": [
+ "e616412c2b2f1bd35d9f86800551f2a2065a9265",
+ "reftest"
+ ],
"css/css-flexbox/flex-wrap_nowrap.html": [
"ef53bb2decb00a9ee881ddcc96d350428b036595",
"visual"
@@ -570585,6 +570665,10 @@
"98b18efcf96d12581583b7a74b1437b41aaa9a2f",
"reftest"
],
+ "css/css-position/position-absolute-dynamic-static-position-table-cell.html": [
+ "3a28b205f243df84190cec492dabad239b0a3d66",
+ "reftest"
+ ],
"css/css-position/position-absolute-dynamic-static-position.html": [
"35d5f65055d09b377e55a7d3e5dcaf8d3b609a39",
"reftest"
@@ -575941,6 +576025,14 @@
"9479b2eb3f51aed98741beadff4a8407b3ae9f33",
"reftest"
],
+ "css/css-sizing/block-fit-content-as-initial-ref.html": [
+ "7fdc142534eb768cb403666614d1c3df8cc1d7bb",
+ "support"
+ ],
+ "css/css-sizing/block-fit-content-as-initial.html": [
+ "7c9422cb5bc761eb0ccbf39449e227e2f70a48ed",
+ "reftest"
+ ],
"css/css-sizing/block-image-percentage-max-height-inside-inline.html": [
"2f6ad684c1fb0be5498dc6a5b938da67adfe3ec7",
"reftest"
@@ -581409,6 +581501,10 @@
"39426d0420287a730dcac47696bd69520e8a6b72",
"testharness"
],
+ "css/css-text/overflow-wrap/overflow-wrap-break-word-white-space-crash.html": [
+ "2bea6aed780679f9eb0de3130e3acf4ffa2b9e98",
+ "testharness"
+ ],
"css/css-text/overflow-wrap/overflow-wrap-cluster-001.html": [
"7911a1b214c04490e16418e71ff733f8f228b45c",
"reftest"
@@ -595697,6 +595793,10 @@
"6b8ed24989fc78a10a70388faf22936094fd92fb",
"testharness"
],
+ "css/css-values/calc-zero-percent-height.html": [
+ "ffb2ecd6dc9c1a1bf4b8f5fc23c851f00e01fd6d",
+ "reftest"
+ ],
"css/css-values/ch-unit-001.html": [
"83374e7bb291e45a44e3002635f967611aa1a5b7",
"reftest"
@@ -596518,7 +596618,7 @@
"testharness"
],
"css/css-variables/vars-font-shorthand-001.html": [
- "3c280547fb353a959bc6df95ad690445835ded98",
+ "e10aa87c4947c6d99ae7d331c7e42aa23e496d31",
"reftest"
],
"css/css-variables/wide-keyword-fallback-ref.html": [
@@ -597702,7 +597802,7 @@
"reftest"
],
"css/css-writing-modes/available-size-003.html": [
- "c938c905ae0aa7462a593308d9652a910069bf50",
+ "70a61a9e34441b4a017241b364a6b1793ff2026b",
"reftest"
],
"css/css-writing-modes/available-size-004.html": [
@@ -597710,7 +597810,7 @@
"reftest"
],
"css/css-writing-modes/available-size-005.html": [
- "ee324898ffea542da389b8d3a7e86dbffc8a6a0a",
+ "5eb832ff36e4bf8c48f6c220d80cdd236137ba45",
"reftest"
],
"css/css-writing-modes/available-size-006.html": [
@@ -597726,7 +597826,7 @@
"reftest"
],
"css/css-writing-modes/available-size-009.html": [
- "5e26975999ea1c07716d6c989ea695c6fbd9c579",
+ "94f083af58497d37ce65648a15c53526da6352bf",
"reftest"
],
"css/css-writing-modes/available-size-010.html": [
@@ -597742,11 +597842,11 @@
"reftest"
],
"css/css-writing-modes/available-size-013.html": [
- "1ffd6564ad0d81c1c4f1107616905145056bc68e",
+ "4cb6b237285a9da5060a5c28a02807675d3a6eeb",
"reftest"
],
"css/css-writing-modes/available-size-014.html": [
- "e0e41fb6b1a8c38bd17bf90386cd90a17822a091",
+ "8e955cf59029050c62060b2597f3a3e3b94bec88",
"reftest"
],
"css/css-writing-modes/available-size-015.html": [
@@ -597754,7 +597854,7 @@
"reftest"
],
"css/css-writing-modes/available-size-016.html": [
- "15038868b80534a55bfc77f7e3fc74a7552cc0cf",
+ "ba398032ba7554fcbf6a2037aafe4ad0820283da",
"reftest"
],
"css/css-writing-modes/available-size-017.html": [
@@ -618686,7 +618786,7 @@
"support"
],
"docs/reviewing-tests/index.md": [
- "2f6ee822fcc480e2c1e519c6d236ac58082f9e2e",
+ "e313f84596da648a111efd5f817737e125829b6c",
"support"
],
"docs/reviewing-tests/reverting.md": [
@@ -618730,7 +618830,7 @@
"support"
],
"docs/test-suite-design.md": [
- "adc6810f38f3fa5cea562e5c1f39c3da2e6c7aef",
+ "6a104e2f1d42fda1111124022dd7d94aaea3a598",
"support"
],
"docs/writing-tests/ahem.md": [
@@ -619178,7 +619278,7 @@
"testharness"
],
"dom/idlharness.window.js": [
- "7d87aeaa337ed7709875428641f78107395d9317",
+ "24b56cf05ada3722c30a7a1427d1cbb324ec366a",
"testharness"
],
"dom/interface-objects.html": [
@@ -620649,6 +620749,10 @@
"6c9963a8222b41e956d5d49d516f8e3c5811fc73",
"support"
],
+ "domxpath/README.md": [
+ "918997b1646d73d71a79c302953ab9f0f8ed69cc",
+ "support"
+ ],
"domxpath/document.tentative.html": [
"b75c0f0d66dacb47a825ae2aa00bb63a19616433",
"testharness"
@@ -620661,10 +620765,6 @@
"c7c102945d070a4ea65cae0e30ea6ec64bb82c95",
"testharness"
],
- "domxpath/interfaces.tentative.html": [
- "9036ad834a764798d2871a71a8b5734051949d8d",
- "testharness"
- ],
"domxpath/xml_xpath_runner.html": [
"42404562a3c95b3004c7b0b7402ea366faeb4d83",
"testharness"
@@ -624009,14 +624109,6 @@
"ad90864fa472cbaa3f95a3fbc912529f31fb3765",
"testharness"
],
- "feature-policy/experimental-features/intrinsicsize-with-unsized-media.tentative.https.sub.html": [
- "9d4757f81ebe83544d428ff5a7161d6c69cdc795",
- "testharness"
- ],
- "feature-policy/experimental-features/intrinsicsize-with-unsized-media.tentative.https.sub.html.headers": [
- "db2dcbc1929b9e1264855e9b80f77dfbda5d4f38",
- "support"
- ],
"feature-policy/experimental-features/layout-animations-disabled-tentative.html": [
"0190eaa84f75e3097b95f70adde89296d47cc1f3",
"testharness"
@@ -626234,7 +626326,7 @@
"testharness"
],
"fetch/sec-metadata/redirect/multiple-redirect-https-downgrade-upgrade.tentative.sub.html": [
- "cede6712264e44ed885f8f6399ab74c2dd03a3f2",
+ "dc6d2d0ec1fd87cd8cd603ed47b03fd59d640f03",
"testharness"
],
"fetch/sec-metadata/redirect/multiple-redirect-same-site.tentative.https.sub.html": [
@@ -626242,11 +626334,11 @@
"testharness"
],
"fetch/sec-metadata/redirect/redirect-http-upgrade.tentative.sub.html": [
- "4f173d9808ac550b443ecb9ed2a00c0b9a402b47",
+ "bfb7ea73e80762569acadbb0fd7d12ec044d8794",
"testharness"
],
"fetch/sec-metadata/redirect/redirect-https-downgrade.tentative.sub.html": [
- "817843828c1b06b90ae3c293164a01c52961cd4e",
+ "8972bd0b6464a1504750a752497b0408f19ed2a8",
"testharness"
],
"fetch/sec-metadata/redirect/same-origin-redirect.tentative.https.sub.html": [
@@ -626310,7 +626402,7 @@
"support"
],
"fetch/sec-metadata/resources/redirectTestHelper.sub.js": [
- "ad78702269dafd81d8c5e15cb7ed60419fd32c5c",
+ "c28af6476aac41a006ec4487d3c73c7d2b31334c",
"support"
],
"fetch/sec-metadata/resources/sharedWorker.js": [
@@ -636566,7 +636658,7 @@
"testharness"
],
"html/rendering/non-replaced-elements/form-controls/resets.html": [
- "ae4da4540145dab0acb6db4455bc8a31522fed2d",
+ "052adca4c5b0b70819c5291503fecc1f39715df6",
"testharness"
],
"html/rendering/non-replaced-elements/form-controls/text-transform-ref.html": [
@@ -639581,14 +639673,6 @@
"6281b2da553948a524fd39cef6d719cf5f42c7f8",
"support"
],
- "html/semantics/embedded-content/svg/intrinsicsize/intrinsicsize-svg-image-ref.html": [
- "41ddd757eca501dcf7e8b059d021d730bab2c729",
- "support"
- ],
- "html/semantics/embedded-content/svg/intrinsicsize/intrinsicsize-svg-image.tentative.html": [
- "a0943169d0a5d960b97d4af9ccc629197e72a175",
- "reftest"
- ],
"html/semantics/embedded-content/the-area-element/area-coords.html": [
"9ec6f3e42732f62d2bf36936a214dc176e23bc07",
"testharness"
@@ -641042,21 +641126,9 @@
"reftest"
],
"html/semantics/embedded-content/the-img-element/img.complete.html": [
- "42113cdd2ff15255292f1ad705355f732a4f137c",
- "testharness"
- ],
- "html/semantics/embedded-content/the-img-element/intrinsicsize/intrinsicsize-with-responsive-images.tentative.html": [
- "739765c0d441aaf0d91c5f90ce544c5e1d81e14b",
+ "dcacf43db2ddf8c2a179d67326a18f78b03ff0a9",
"testharness"
],
- "html/semantics/embedded-content/the-img-element/intrinsicsize/intrinsicsize-without-unsized-media.tentative.https.sub.html": [
- "4192e567fcc1921041e6a98d210df41199f701a6",
- "testharness"
- ],
- "html/semantics/embedded-content/the-img-element/intrinsicsize/intrinsicsize-without-unsized-media.tentative.https.sub.html.headers": [
- "4fbf3f5adddbcb8ec95fc0e2192f4da841e93b8c",
- "support"
- ],
"html/semantics/embedded-content/the-img-element/invalid-src.html": [
"37ea8ce754a3feaa3e305f10899632d231c92363",
"testharness"
@@ -641245,14 +641317,6 @@
"7819ee1c1891887aadec9bb600bcb18e6cc562e3",
"testharness"
],
- "html/semantics/embedded-content/the-video-element/intrinsicsize/intrinsicsize-without-unsized-media.tentative.https.sub.html": [
- "d749d5576e6881ea900f7cd26e0ff6adad2610f3",
- "testharness"
- ],
- "html/semantics/embedded-content/the-video-element/intrinsicsize/intrinsicsize-without-unsized-media.tentative.https.sub.html.headers": [
- "4fbf3f5adddbcb8ec95fc0e2192f4da841e93b8c",
- "support"
- ],
"html/semantics/embedded-content/the-video-element/video-tabindex.html": [
"30448747892203f3d53ef4b9615a5a50bb62c62f",
"testharness"
@@ -641317,36 +641381,92 @@
"82798eaa84f533cdc675c653ef22fcb12b52137e",
"testharness"
],
+ "html/semantics/forms/autofocus/autofocus-on-stable-document.html": [
+ "47e3e3fd0abdc93e8447c099314935f8cdc31c42",
+ "testharness"
+ ],
+ "html/semantics/forms/autofocus/first-reconnected.html": [
+ "99ee9198d1b0a39605ee7115ba71b1178e815943",
+ "testharness"
+ ],
"html/semantics/forms/autofocus/first-when-later-but-before.html": [
- "0267f46627f6db579ee639355d6e265e52bc305f",
+ "f361463401b555f4c90cc25f195dd8b6c7e03b0b",
"testharness"
],
"html/semantics/forms/autofocus/first-when-later.html": [
- "9ced437f4a9456ff9076feb3965172ddb9d4a694",
+ "1d64b863a16e8a0745c4f207d5a92e80175ee34f",
"testharness"
],
"html/semantics/forms/autofocus/first.html": [
- "de56cf74eda506c55460cc6da85923b5b7001381",
+ "02ebb79a3e9dff0f1b0211eb187b7a91f7de8c17",
+ "testharness"
+ ],
+ "html/semantics/forms/autofocus/focusable-area-in-top-document.html": [
+ "327040eeeeb7da9bf134cb7120b60c7d1e76d5c7",
"testharness"
],
"html/semantics/forms/autofocus/no-cross-origin-autofocus.html": [
"c3974bd02a3655cef5513258e81f65e2f86e07d3",
"testharness"
],
+ "html/semantics/forms/autofocus/no-sandboxed-automatic-features.html": [
+ "991373d3363a195bde7c7e4e9ad255026e173e47",
+ "testharness"
+ ],
"html/semantics/forms/autofocus/not-on-first-task.html": [
"50efc176935c710f43a42c31ecc0b7676e96b833",
"testharness"
],
+ "html/semantics/forms/autofocus/queue-non-focusable.html": [
+ "e3b556035d35f6ea18d51cd3772651a22940d161",
+ "testharness"
+ ],
"html/semantics/forms/autofocus/resources/child-autofocus.html": [
"afd5601a523ff0a1d60d37b171b2098a38600ace",
"support"
],
+ "html/semantics/forms/autofocus/resources/erase-first.css": [
+ "bbbcf799393fc047dae6d47836c3696868df8fb7",
+ "support"
+ ],
+ "html/semantics/forms/autofocus/resources/frame-with-autofocus-element.html": [
+ "985cba41494919525031081d236e4409aace453c",
+ "support"
+ ],
+ "html/semantics/forms/autofocus/resources/moving-autofocus-to-parent.html": [
+ "fc6c298a46e376cf45089f168cf841cab59ffd5c",
+ "support"
+ ],
"html/semantics/forms/autofocus/resources/utils.js": [
- "f3690a633ffb20a09430cf126eab9871fcf03c38",
+ "0eeb5a9f0adf1d09959227241cd71fe32ebb485c",
"support"
],
+ "html/semantics/forms/autofocus/skip-another-top-level-browsing-context.html": [
+ "d392b903f075276a03189207e57d789608523de1",
+ "testharness"
+ ],
+ "html/semantics/forms/autofocus/skip-document-with-fragment.html": [
+ "a4301e13516634e9fc09d1b8084091a2697b1f24",
+ "testharness"
+ ],
+ "html/semantics/forms/autofocus/skip-non-focusable.html": [
+ "008371d8e163fbdec937e29435fe61dffd520cde",
+ "testharness"
+ ],
+ "html/semantics/forms/autofocus/skip-not-fully-active.html": [
+ "32008b3019e905488c35ea432de396a2641cb61a",
+ "testharness"
+ ],
+ "html/semantics/forms/autofocus/spin-by-blocking-style-sheet.html": [
+ "22a4c3573cccf909d3a5675db2aab97a4f366bc0",
+ "testharness"
+ ],
"html/semantics/forms/autofocus/supported-elements.html": [
- "cbd21010ffe41eb06d4c95c87ed6c4b87a2e7ab5",
+ "398577e7d51edf10ea2571ec4e220394208f6931",
+ "testharness"
+ ],
+ "html/semantics/forms/autofocus/update-the-rendering.html": [
+ "afaf0926f5b55e4f1925010c7262ed26a616d3be",
"testharness"
],
"html/semantics/forms/constraints/form-validation-checkValidity.html": [
@@ -641374,15 +641494,15 @@
"testharness"
],
"html/semantics/forms/constraints/form-validation-validity-rangeOverflow.html": [
- "ca423ef9ed737f9f630db489ec2003393ec24b18",
+ "fedf2ea4e4f0aa5018db5bb24ec3bf0e15333992",
"testharness"
],
"html/semantics/forms/constraints/form-validation-validity-rangeUnderflow.html": [
- "d6bf86060b1ae641f5c49c9cd381d2d68f683a35",
+ "8ac3aae1279c0f6df2203251aae26854ba551b57",
"testharness"
],
"html/semantics/forms/constraints/form-validation-validity-stepMismatch.html": [
- "174ecaf33a21e972c1464579a0fc444c9556b112",
+ "6d8192bfbfeb6f0b1c472fe55eee58af6b4b9e1c",
"testharness"
],
"html/semantics/forms/constraints/form-validation-validity-tooLong.html": [
@@ -648618,7 +648738,7 @@
"support"
],
"interfaces/appmanifest.idl": [
- "ddfe82dc34d31868ea044befa667a8c9987e5678",
+ "4a6425829f23da3cd1f78f74ff52a18635f7af7c",
"support"
],
"interfaces/audio-output.idl": [
@@ -648734,7 +648854,7 @@
"support"
],
"interfaces/dom.idl": [
- "91157033c82335d4eb835907680210bb2141fdb4",
+ "03a0201b16fed569429c6cfc709063ed31681422",
"support"
],
"interfaces/element-timing.idl": [
@@ -648750,7 +648870,7 @@
"support"
],
"interfaces/entries-api.idl": [
- "71e80c717b2becc9a005e471553910a26fd0a326",
+ "548aec13ab70eeedb9ba01ff96e0b3cb1d783510",
"support"
],
"interfaces/event-timing.idl": [
@@ -649074,7 +649194,7 @@
"support"
],
"interfaces/web-nfc.idl": [
- "5107cf3b577ba2677226fd215e38cf40cc81d88a",
+ "8c77339ae865fbe2a67dd6c1247c797a5bab058d",
"support"
],
"interfaces/web-share.idl": [
@@ -650869,6 +650989,14 @@
"585aebaf393d85187b644a97f6e7f28535fa9095",
"reftest"
],
+ "mathml/relations/html5-tree/css-inline-style-dynamic.tentative-ref.html": [
+ "13f0139273690992825daa68fcc0666679590490",
+ "support"
+ ],
+ "mathml/relations/html5-tree/css-inline-style-dynamic.tentative.html": [
+ "ca3e679491951d9a573a0f754491cf549a565953",
+ "reftest"
+ ],
"mathml/relations/html5-tree/css-inline-style-interface.tentative.html": [
"b82f98e28b70cbfbadf7f585c9a2c8a2612ba05f",
"testharness"
@@ -652558,13 +652686,17 @@
"testharness"
],
"mixed-content/generic/mixed-content-test-case.js": [
- "eb9fc13f7c0fc5af0ade3df58a942fde5ae6d823",
+ "ee34c4973a9014acf78037d2e85c24aa994cc266",
"support"
],
"mixed-content/generic/sanity-checker.js": [
"55a103adf0f29c615d40bc47943be1aec25c8f1e",
"support"
],
+ "mixed-content/generic/test-case.sub.js": [
+ "d25986e5c26745976e13d2d683c3bece3ac2ccc0",
+ "support"
+ ],
"mixed-content/generic/tools/__init__.py": [
"e69de29bb2d1d6434b8b29ae775ad8c2e48c5391",
"support"
@@ -652574,7 +652706,7 @@
"support"
],
"mixed-content/generic/tools/generate.py": [
- "9c911aa6c4102a411c1b134e33afeab69f600647",
+ "b80bc8df6bbebe969b88fd48d52abc7819ac9a3c",
"support"
],
"mixed-content/generic/tools/regenerate": [
@@ -653450,11 +653582,11 @@
"testharness"
],
"mixed-content/spec.src.json": [
- "95dc2d318f54fcff89d5ad4fbd15656f32608288",
+ "e4844a8016b6f3242a1b8dc1110461cd39ff1e33",
"support"
],
"mixed-content/spec_json.js": [
- "0868df220fb9fbe3eb5700f662c2321d708ea9ca",
+ "009a853077b5c37c6eeae9f87f0be75109c584fd",
"support"
],
"mixed-content/video-tag/http-csp/cross-origin-http/top-level/keep-scheme-redirect/optionally-blockable/opt-in-blocks.https.html": [
@@ -662745,9 +662877,9 @@
"895a89109c6d75d287b8508f0d1a10fa3189a671",
"testharness"
],
- "pointerevents/extension/pointerevent_coalesced_events_attributes-manual.html": [
- "89149468a5d23d494f6b09d4142b43c8d1d2289c",
- "manual"
+ "pointerevents/extension/pointerevent_coalesced_events_attributes.html": [
+ "fa68124c829f46d24c4a2cda789890d27f11fe73",
+ "testharness"
],
"pointerevents/extension/pointerevent_constructor.html": [
"6971dcecfdebf3a113ef4ef9c9e8bd7bdf88ea02",
@@ -662762,7 +662894,7 @@
"manual"
],
"pointerevents/extension/pointerevent_pointerrawupdate.html": [
- "0d317010621d005b32631ad26a4f3b3ca08b181a",
+ "0f46583c9b5d83517a3028bfa735072ec306cccd",
"testharness"
],
"pointerevents/extension/pointerevent_pointerrawupdate_in_pointerlock-manual.html": [
@@ -662894,7 +663026,7 @@
"manual"
],
"pointerevents/pointerevent_pointercancel_touch.html": [
- "a645033a247437604d6b1c4614079c9193c28e9d",
+ "b09ddd740a6d6775806731c8e069a4674e3b12e3",
"testharness"
],
"pointerevents/pointerevent_pointercapture_in_frame.html": [
@@ -662906,7 +663038,7 @@
"testharness"
],
"pointerevents/pointerevent_pointerleave_after_pointercancel_touch.html": [
- "555e5feb010aa3277c454e8396d2b976f552dbb8",
+ "8425667a104a3c783285a868196cbb2b255b6f20",
"testharness"
],
"pointerevents/pointerevent_pointerleave_descendant_over.html": [
@@ -662938,7 +663070,7 @@
"testharness"
],
"pointerevents/pointerevent_pointerout_after_pointercancel_touch.html": [
- "13e7ffaebc1a80ba7bef12d32088aca1c250cde2",
+ "782289384ab3cdb6257c142eb9ff9da674d0d8bf",
"testharness"
],
"pointerevents/pointerevent_pointerout_pen.html": [
@@ -662950,7 +663082,7 @@
"testharness"
],
"pointerevents/pointerevent_releasepointercapture_events_to_original_target.html": [
- "12e31cdb234d1bbb5cc43b436415e44b12daaef2",
+ "6f6d30e16e1c5376a1a5b57c0c65bc683e075334",
"testharness"
],
"pointerevents/pointerevent_releasepointercapture_invalid_pointerid.html": [
@@ -662958,7 +663090,7 @@
"testharness"
],
"pointerevents/pointerevent_releasepointercapture_onpointercancel_touch.html": [
- "493236150dd32d0c6713b5b2dff123d1eefd5f7b",
+ "c54ee2a9d4ebb242b33f89c2b436753dfff6dbbc",
"testharness"
],
"pointerevents/pointerevent_releasepointercapture_onpointerup_mouse.html": [
@@ -662978,7 +663110,7 @@
"testharness"
],
"pointerevents/pointerevent_sequence_at_implicit_release_on_click.html": [
- "0c6e2c532f9cc5ae410f6bd399340c55e937859d",
+ "4b424f27643a95f4170da5d7fb794ca3dbef1ce4",
"testharness"
],
"pointerevents/pointerevent_sequence_at_implicit_release_on_drag.html": [
@@ -662990,7 +663122,7 @@
"testharness"
],
"pointerevents/pointerevent_setpointercapture_inactive_button_mouse.html": [
- "7d0b00d47bc276dbba5ae3076bfbed0a912ea327",
+ "fa9a5fb3c5b8ae7df867159aab8fc3ad7a6c77e2",
"testharness"
],
"pointerevents/pointerevent_setpointercapture_invalid_pointerid.html": [
@@ -663018,11 +663150,11 @@
"support"
],
"pointerevents/pointerevent_suppress_compat_events_on_click.html": [
- "341a82d97a8e0ff4ffbe2d87b817fce807dd39b6",
+ "2f99e7a976ac8006cff25b9cde1ee1e29b6a14d1",
"testharness"
],
"pointerevents/pointerevent_suppress_compat_events_on_drag_mouse.html": [
- "6ed75ab4cbcda3c673b3328a826019bdade4db5d",
+ "6ed19c24678aa03c82633af7aa146fba80232c0b",
"testharness"
],
"pointerevents/pointerevent_touch-action-auto-css_touch.html": [
@@ -663050,7 +663182,7 @@
"testharness"
],
"pointerevents/pointerevent_touch-action-inherit_child-pan-x-child-pan-y_touch.html": [
- "704b4188979f8d39e6812b5b4a0e8900d62d7e6f",
+ "99677313de57238767c32302a6d81d708a459e0e",
"testharness"
],
"pointerevents/pointerevent_touch-action-inherit_highest-parent-none_touch.html": [
@@ -664225,8700 +664357,9344 @@
"93b6037ca632a678f8c3f1e071392e8e3bf1540c",
"testharness"
],
- "referrer-policy/generic/iframe-src-change.html": [
- "15202a76a1ea3b7ad8deb35cdb33826414d7a95b",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html": [
+ "3d09f39410b25113d0aa00e0782e688e086f2705",
"testharness"
],
- "referrer-policy/generic/inheritance/iframe-inheritance-data.html": [
- "06c3c9b0c4bcf4297f903d422110c2de420679e3",
- "testharness"
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
+ "support"
],
- "referrer-policy/generic/inheritance/iframe-inheritance-srcdoc-child.html": [
- "08acb405c211e4cf84ae6565a84120ad45b0271b",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html": [
+ "9c7a9245ae8a3ba9daa3a13fb4105a54641fd201",
"testharness"
],
- "referrer-policy/generic/inheritance/iframe-inheritance-srcdoc.html": [
- "34ea0045b4871d97acc9b9359e7920c7e04d8c59",
- "testharness"
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
+ "support"
],
- "referrer-policy/generic/link-rel-prefetch.html": [
- "914ddfc4b225d26c675c61ecf623fdebb10e4524",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html": [
+ "4be57de275585696151bb0c11f3796a3c1cbaa19",
"testharness"
],
- "referrer-policy/generic/multiple-headers-and-values.html": [
- "d4826ce8a7ae2b40898a598c36523d9520c54b4c",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
+ "support"
+ ],
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html": [
+ "6f4cebe3ee718791beeea6474b9911ce27c9b3f4",
"testharness"
],
- "referrer-policy/generic/multiple-headers-and-values.html.headers": [
- "d1acc2f1d3cbce700865d96937e612c56e075166",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
"support"
],
- "referrer-policy/generic/multiple-headers-combined.html": [
- "47b59f556614119ee1dfba56e6673a652a725868",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html": [
+ "2dc8bbae43bb268a6e844c26bfc4d3e8f78ea5d9",
"testharness"
],
- "referrer-policy/generic/multiple-headers-combined.html.headers": [
- "fc30a2a18627cf0cb485836f8d44f45beca510f2",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
"support"
],
- "referrer-policy/generic/multiple-headers-one-invalid.html": [
- "9bd661fe6a247809f1e8b7ee5ccfdcadad0f4edd",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html": [
+ "fca7e959656b0ba22cf00f25e25a54386125108d",
"testharness"
],
- "referrer-policy/generic/multiple-headers-one-invalid.html.headers": [
- "075219380414598f4535faa973fe69468fc7d37e",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
"support"
],
- "referrer-policy/generic/multiple-headers-one-unknown-token.html": [
- "7c28a5ada5273d94ac07ca2ec182c06047b9a560",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html": [
+ "a7abfde5e55086741b52f2446bc76ad560fdd407",
"testharness"
],
- "referrer-policy/generic/multiple-headers-one-unknown-token.html.headers": [
- "46feffd705fe0e559b6f80a4a6b7f7bc46b26121",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
"support"
],
- "referrer-policy/generic/multiple-headers.html": [
- "7f0364f1853f65cb1020af53bbeefcd6f44b0011",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html": [
+ "414983622a16963e823162dc10d40157daadf5e4",
"testharness"
],
- "referrer-policy/generic/multiple-headers.html.headers": [
- "dd1dd853f2030bac5c036f693a7cf0eca6daba1a",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
"support"
],
- "referrer-policy/generic/referrer-policy-test-case.sub.js": [
- "972ce8de06600d56a94acb503b7e0d5bae3ad3eb",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html": [
+ "4e534a9c7535e31eb8972b077f59511bd66ff041",
+ "testharness"
+ ],
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
"support"
],
- "referrer-policy/generic/sandboxed-iframe-with-opaque-origin.html": [
- "0e8e5e1306f5f51c17d8a89c92bb86573c3e275e",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html": [
+ "af8dba9f66f9f77c011b41086ad451c10da6b3a3",
"testharness"
],
- "referrer-policy/generic/sanity-checker.js": [
- "e296ce93b965b788ea79f2f2b6cff45d5dce55f0",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
"support"
],
- "referrer-policy/generic/subresource-test/area-navigate.html": [
- "ad49c0c2efd7ef18070a73caafd9223e1ec3b39d",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html": [
+ "131dc9a4c0b26d511c221dc661ccb0adb6a91549",
"testharness"
],
- "referrer-policy/generic/subresource-test/attr-referrer-invalid-value.html": [
- "bfdf1166ce7876c478b4cfcf9dab439d04a7e437",
- "testharness"
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
+ "support"
],
- "referrer-policy/generic/subresource-test/fetch-messaging.html": [
- "2d835274c132591a8edc574ad747e7d103de0659",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html": [
+ "48eee6b1da777d15b1e85e9d143efc043a95bde7",
"testharness"
],
- "referrer-policy/generic/subresource-test/iframe-messaging.html": [
- "2f97ce4c62a8dc96c886e17b9113ee9b7c021174",
- "testharness"
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
+ "support"
],
- "referrer-policy/generic/subresource-test/image-decoding.html": [
- "97abb153f1fca19eb53c280117120299374b1b6c",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-http.keep-origin.http.html": [
+ "724c507b4810500e506fb11ab59d2b582be775b0",
"testharness"
],
- "referrer-policy/generic/subresource-test/link-navigate.html": [
- "e96fd22539829ef2f71053517941eb3a8178d167",
- "testharness"
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-http.keep-origin.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
+ "support"
],
- "referrer-policy/generic/subresource-test/script-messaging.html": [
- "44c938fa6e1c34b3761ac6a797d2e87a319fc08b",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-http.no-redirect.http.html": [
+ "6f86a5bd30480cd6a00e029b7809d8ebd9c3dcab",
"testharness"
],
- "referrer-policy/generic/subresource-test/worker-messaging.html": [
- "0612e9965983c4ee696e63be71dcdc31981aa31a",
- "testharness"
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-http.no-redirect.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
+ "support"
],
- "referrer-policy/generic/subresource-test/xhr-messaging.html": [
- "8afbf1db237130d6c8258b755ceac5258f6500fa",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-http.swap-origin.http.html": [
+ "4933e9c413ea3c85233f6e3f28b460bc41f632cd",
"testharness"
],
- "referrer-policy/generic/tools/__init__.py": [
- "e69de29bb2d1d6434b8b29ae775ad8c2e48c5391",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-http.swap-origin.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/generic/tools/clean.py": [
- "715e1d6ae4b53461a99b3789a5200e4cb6456f4c",
- "support"
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-https.keep-origin.http.html": [
+ "cf55249cd7d04c9bc447b4db830893101a85aee5",
+ "testharness"
],
- "referrer-policy/generic/tools/generate.py": [
- "ba1e963787bef98bdd0a3eb2016296995f631f97",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-https.keep-origin.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/generic/tools/regenerate": [
- "e6bd63519b331b3a921755445f6895e39f7864f5",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-https.no-redirect.http.html": [
+ "c5233ad7fda54319feee0c8a8a0f57d19dae9f75",
+ "testharness"
+ ],
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-https.no-redirect.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/generic/unsupported-csp-referrer-directive.html": [
- "0a29f38c0288c34c23eea14a6053d68d6b19582e",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-https.swap-origin.http.html": [
+ "53098fb5eefd632bb94877133a88c44e412d2204",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html": [
- "ea712646bb16025d8bf0e40aa98104a490a7065e",
- "testharness"
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-https.swap-origin.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
+ "support"
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html": [
- "cfc379c0534522e175ff0326f9aafe72d4e49d2e",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-http.keep-origin.http.html": [
+ "4e8d4a9c9c32519a1586c0a460d42629b979bb6a",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html": [
- "0d592b59d40b62543de7b7d2d25d55817f0bdc17",
- "testharness"
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-http.keep-origin.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
+ "support"
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html": [
- "8d108c74608fad1c9765c5d6284bad72e54275b5",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-http.no-redirect.http.html": [
+ "e03ea85dfb98a8496ff7e312fe8ade8b88fc3df8",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html": [
- "8a3731927e0f015697c5b56248a63c7345d2d195",
- "testharness"
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-http.no-redirect.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
+ "support"
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html": [
- "463728a4ecd9cd592090b5be6648bf2d13251d54",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-http.swap-origin.http.html": [
+ "2e7836a1b2f8ec4b7dfeb911484b667813417a64",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html": [
- "d5275be0409ea79c947503e825ccf11fe1912295",
- "testharness"
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-http.swap-origin.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
+ "support"
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html": [
- "21ea496ca4911832d4fd62afdde6470fb5e90b9e",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-https.keep-origin.http.html": [
+ "4e91d52fd052de8c91adef8d2c7ed4921362c80c",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html": [
- "c54ac62bfe9fccdb76c7897bf2b3d6d85207e322",
- "testharness"
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-https.keep-origin.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
+ "support"
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html": [
- "cdcc134dedfdc84dce7975df662466bc56115032",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-https.no-redirect.http.html": [
+ "1943c0909bf427aa93c7a242e2f17e10d0a79810",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
- "43435ff17b2900b564d7cae86b35a47752eb279e",
- "testharness"
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-https.no-redirect.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
+ "support"
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "61b962276bb7fca9cdb6f247cbf6e691210015c3",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-https.swap-origin.http.html": [
+ "489c3e799b7214702bb7ad4ff9751cb56af53f60",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html": [
- "0ac4282fb4175860d7beb8256437bc9bcd32b4ad",
- "testharness"
+ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-https.swap-origin.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
+ "support"
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "ad75a53979dcf904fdbf20858080192491feeb55",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html": [
+ "65eba0840206ee229ec99cd31fae4bd4ee7865c8",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "0cfaedb10bfc4488d1c3824ede8de6ecd8bd81c4",
- "testharness"
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
+ "support"
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
- "3ef49b93f0f6fb0101e1ecb94d1cfc42a3b15986",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html": [
+ "37f4e008b3500b675b9ca99627ab93702d3b7186",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "a060a3bcfe270df9b3da7b9cb2c50ea9b90aaf04",
- "testharness"
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
+ "support"
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "deb4132ab084ba1f8f0db78ca192c189de3bf7f9",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html": [
+ "369c8a5c0b2ec686b272f11e474fb91005e2f925",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html": [
- "793166af730eab51f8c8fe58f33352c7495c5312",
- "testharness"
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
+ "support"
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "1737e72548c1378be77074d8d4cfc4307bdeadba",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html": [
+ "d2a864a064f3892252cf040b2200a4af786c136e",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html": [
- "57fb4a946c1897e61efd7160ef7b64a58296bdae",
- "testharness"
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
+ "support"
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html": [
- "c64034d2bbd16777ac5d20b18ae662ab59d3d984",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html": [
+ "d6459820a28547676f8caf592d0c48d00d1a8614",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html": [
- "387f84c09bae3a8644ef28b0cb3db7734047b7c3",
- "testharness"
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
+ "support"
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html": [
- "4d0c946bd7a58083be4fe854cfdcb1e7e6455705",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html": [
+ "ecbf180b4c201fb7a3b137193105ffceed71a3f1",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html": [
- "9c769ba10d952c874289c5a7b0dce4757f201a1e",
- "testharness"
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
+ "support"
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html": [
- "2b1ee01973e73e5ffb1ccae3229e22d98b9f673e",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html": [
+ "9a4124ccb67f61c9b9de5aba7a1f4203a2a3500b",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html": [
- "42665670f5bb6de4d020e40aab5dea56940d332c",
- "testharness"
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
+ "support"
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html": [
- "fa0accb2c068094a4d718f9d21b69b145072c770",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html": [
+ "40104428e2e5afb683e452fad6f8aa697021e42d",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html": [
- "59d852294b20500d5facf71ca8f112106a0539b9",
- "testharness"
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
+ "support"
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html": [
- "e1b79bca8050de32a3a38ef93a89cbe42b9d6206",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-http.swap-origin.http.html": [
+ "b885d9457bcfd3036535af20d269f3240dd527ed",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
- "f0d321a52cf5a0c3c12589701b0c1bf55db97e48",
- "testharness"
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-http.swap-origin.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
+ "support"
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "ceeaba32d598ec2d4ac74c2e59268b9fdf6d59e8",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-https.keep-origin.http.html": [
+ "8cac3b45fb5e7cc927469082fde21efa41bf6e1f",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html": [
- "59322a856e01b891454f4b97b182e9cd217766b8",
- "testharness"
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-https.keep-origin.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
+ "support"
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "ea8dcab7c7d3cbcda26f73eba6059a28a1085251",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-https.no-redirect.http.html": [
+ "500f3f39a959a81702b950c00f2e4b61081f18b9",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "5aa80479004486ae33c3b9cc0421db7f18608494",
- "testharness"
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-https.no-redirect.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
+ "support"
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
- "df88f442fab55c2c019ea63aa679328370cb9fd2",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-https.swap-origin.http.html": [
+ "0c6e5e90a6c70fecd0189b86c520365e6db6cd23",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "8ffbd3a852caff1dbefbd463a45d5d47dbc77fab",
- "testharness"
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-https.swap-origin.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
+ "support"
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "455efc4ae70503796438569eeb318d2ff1c1ee95",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-http.keep-origin.http.html": [
+ "79b4f65accf1aa9124aa54447cf42425c4b1cb9c",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html": [
- "89da6893a20e9b5957c0ee09b15a8d6172362cc6",
- "testharness"
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-http.keep-origin.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
+ "support"
],
- "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "6b29a191efeddb78168ad7a1cbf4d1c5ceff38de",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-http.no-redirect.http.html": [
+ "df734f1e60cfac06bdbb0b490f25d56adfc93801",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html": [
- "eedf34f796da2a92801d91c3d4b2504a5f42983a",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-http.no-redirect.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
+ "support"
+ ],
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-http.swap-origin.http.html": [
+ "70fd1c97d13a3105917bc1ffb60bdff55ba4df97",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-http.swap-origin.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html": [
- "8b77fb7524703bad5ad9c54a4264e38b82bd7d67",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-https.keep-origin.http.html": [
+ "82b9c0f33105ad283e75d34899f3bbf2737600c3",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-https.keep-origin.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html": [
- "3e921ee20512d1adecf6aa9abf5dc05acb312297",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-https.no-redirect.http.html": [
+ "001ad080c579d1a91e102e080d96dc660a80bb03",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-https.no-redirect.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html": [
- "c7821aae3f693ba5f631cde37f378e413687dcf0",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-https.swap-origin.http.html": [
+ "4bf38ace3e16a310f231d689a7f8554c0e8b0865",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-https.swap-origin.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html": [
- "bae8956bf7dd3441d31da9c9e8520f61ede8639f",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-http.keep-origin.http.html": [
+ "2e72613575a820e792e5143859d2c434cca9792b",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-http.keep-origin.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html": [
- "c418c5a27142173dfd416a795ff5e19fa7292e7b",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-http.no-redirect.http.html": [
+ "597c2f6c77872a724be5eaa24e28e34f610df3be",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-http.no-redirect.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html": [
- "d8c7a5467c56bef782dbe1b3efaf68a80d7f6bc3",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-http.swap-origin.http.html": [
+ "038d63c730ed6188cba6531db8c331d15c134ae1",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-http.swap-origin.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html": [
- "437a2c703c09847bf2836d21513ed9f3297edac8",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-https.keep-origin.http.html": [
+ "f4c5190091e736026b25bb574af3f35b4b5a85c7",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-https.keep-origin.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html": [
- "5887e73ae7a2abe0bb819d8dc9ec1562ab07960b",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-https.no-redirect.http.html": [
+ "c6a4a9508dee37f436a44f2c03d7fef2e87d1901",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-https.no-redirect.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html": [
- "e320e6191b6671a574000c5f7555a570c2b78359",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-https.swap-origin.http.html": [
+ "9880f1600576922341b32b182e3aa736b484bbfc",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-https.swap-origin.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html": [
- "fc100af00818b1e598fa8760713e554ca7fd995d",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-http.keep-origin.http.html": [
+ "656cf35626b84abac42f2ea9d1f7b3595e9b7f21",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-http.keep-origin.http.html.headers": [
+ "be66cf9321103b1397670f3acc89cecc09aabec2",
"support"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html": [
- "c9810465b2cdec20f641eccf58bb2704585c8d96",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-http.no-redirect.http.html": [
+ "9639c199a568ef5928c0d5911a5e59ee9c2dc1e1",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-http.no-redirect.http.html.headers": [
+ "be66cf9321103b1397670f3acc89cecc09aabec2",
"support"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html": [
- "71c95f870ffa9183d14e2e60b245619ced2f7171",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-http.swap-origin.http.html": [
+ "5dd7ddacfc1ee6e3bc22f9fda85373ae0087980d",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-http.swap-origin.http.html.headers": [
+ "be66cf9321103b1397670f3acc89cecc09aabec2",
"support"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html": [
- "9fe5ef8a619b38e36e83266e06cc159acab33d94",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-https.keep-origin.http.html": [
+ "26bf31303222315a69d103f9dfdfbbb64db6d9dd",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-https.keep-origin.http.html.headers": [
+ "be66cf9321103b1397670f3acc89cecc09aabec2",
"support"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html": [
- "0901c1bc1f647ad666ba9803c18a6c9641a4d618",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-https.no-redirect.http.html": [
+ "f9fd0b0b036aba45fa2eef60f15f1a3a5badd0dd",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-https.no-redirect.http.html.headers": [
+ "be66cf9321103b1397670f3acc89cecc09aabec2",
"support"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html": [
- "3f3bcb557ef2681ad0b0113fad98b19d735d61bc",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-https.swap-origin.http.html": [
+ "818b0816c242a44d12bf139526a12efabfdf94ec",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-https.swap-origin.http.html.headers": [
+ "be66cf9321103b1397670f3acc89cecc09aabec2",
"support"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
- "7a78d49b6411187729cb7b7d9a6a9e4780d3a7ae",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-http.keep-origin.http.html": [
+ "166d53adff383437c3dbf853a9e78beb627a39d6",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-http.keep-origin.http.html.headers": [
+ "be66cf9321103b1397670f3acc89cecc09aabec2",
"support"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html": [
- "51adeac1f1577e02441b559018b1316ac4c56153",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-http.no-redirect.http.html": [
+ "d91a2e81636353a4d00afd00740aefb846f3c203",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-http.no-redirect.http.html.headers": [
+ "be66cf9321103b1397670f3acc89cecc09aabec2",
"support"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html": [
- "97c8b34e5fb875615f9d75326fd67d68c5df00fa",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-http.swap-origin.http.html": [
+ "ba587f84dbf374e8d05df6c88baab8b4eb69d3cb",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-http.swap-origin.http.html.headers": [
+ "be66cf9321103b1397670f3acc89cecc09aabec2",
"support"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html": [
- "67241ce46163e5db9ecc697db16e9ad51e40ca5e",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-https.swap-origin.http.html": [
+ "f386befc6eb44c98a6a33a5c6fbc1b4afd80ab41",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-https.swap-origin.http.html.headers": [
+ "be66cf9321103b1397670f3acc89cecc09aabec2",
"support"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "f60094da322b33a0ab1c6c2f880191484046b6cc",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html": [
+ "27d8de6246d4a96041e6a5450b3bff421a177915",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html": [
- "183e4dd4367108481fcd1c101ca89bc1c9f41f6c",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html": [
+ "b914efdc87c267ce47d99ab792895d3a18fec257",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "5a3b4486d82730155537ea030dcf34734c628392",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html": [
+ "bfd6f1c3f47c7e6bfe8bd73133b469ee13989dc8",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "6144b6e19ba4ebadce84ed1b36939c8c163e51fc",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html": [
+ "0e9935af62aababb7cb39c128d83f03c268afc65",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
- "4fe4fe8bc0ddc96bacb0dc6bfe0f7ea30e6cc6b4",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html": [
+ "5d7e1268e1910350811d5f009c9c052e056e9236",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "0ed931f885d3e864ccbec65d8e4eecd9195edb7c",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html": [
+ "11a717d4725b53505be8e706b03b38d0bd15776d",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "9be57e4a592571297a88ab07e0e3e22cc0622f84",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html": [
+ "8b36d15a3fd873b42151bbf3bf5472e2cc3a1356",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html": [
- "2df7c747290f13a72ae2b0db24f4d4879b925bab",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html": [
+ "f1158b0cf48f134892febd29b93aecad385d4750",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "75d4b9fbe19a83a6ebd04b93ff4e6ca2c8cd1478",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-http.swap-origin.http.html": [
+ "da39661bcbfb25621e8c0c4f770e8d65b8f42c48",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-http.swap-origin.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html": [
- "2a9392df1d64b1cc2efe4987e3ffd7fc777bde1b",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-https.keep-origin.http.html": [
+ "d9fe8e197702b0a1ad5484933838b56cdf7fd6f4",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-https.keep-origin.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html": [
- "028ee939474deafeca109aaa87caaaa25bf4b9a1",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-https.no-redirect.http.html": [
+ "26154b93ecfa9922524d7190a8853f0b20326d12",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-https.no-redirect.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html": [
- "66e42d84e1bc419dbd98243943a45bdaa9d546b8",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-https.swap-origin.http.html": [
+ "eea93a2d5c23bce2774f0538b9698baec8406551",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-https.swap-origin.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html": [
- "0fc1d169c9a22a0f2d585dccd36536463ae34730",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-http.keep-origin.http.html": [
+ "129d0344bd83ccd2afe2e8bb3ed540fac38d039d",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-http.keep-origin.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
"support"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html": [
- "7e988ffbc8e84ddf4de79846c1138e47920d62ec",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-http.no-redirect.http.html": [
+ "df2cec8fc86f29df3dc7110129013be0428e36e8",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-http.no-redirect.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
"support"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html": [
- "335fde0034b4a44d8be0f98f86951801a8335f34",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-http.swap-origin.http.html": [
+ "91e9d03c5459d4af68e46217de66ad7cb0a5a081",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-http.swap-origin.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
"support"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html": [
- "3ab4e9b33a7eb3afbc1c90bc9dc72e367afe0fb6",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-https.keep-origin.http.html": [
+ "5820a30aa69553775e0311fefc74e8a622cfe5b2",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-https.keep-origin.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
"support"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html": [
- "c8946d88a006db7e3359791bde36ba3eadb36d22",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-https.no-redirect.http.html": [
+ "008db741e3b16a8570e6861cb6382a292c7455c6",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-https.no-redirect.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
"support"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html": [
- "e79e8a057422b9264d119aa22563df314e65f8b9",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-https.swap-origin.http.html": [
+ "6512f2a1ec32c3f0c911175a2298eb5e39bc1fc0",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-https.swap-origin.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
"support"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html": [
- "cc5ea2700e16603f28a3fb85ed150b9e48807037",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-http.keep-origin.http.html": [
+ "773b18c0a5a71b40ac58ccd183b737afb61e1a7b",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-http.keep-origin.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
"support"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html": [
- "759625f622c159d0b5d811c51deac8b6e54d493e",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-http.no-redirect.http.html": [
+ "073133aaa2b8b741ca19142a2247c042f7643e20",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-http.no-redirect.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
"support"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html": [
- "34c39041f990e91f539d4f14dac5811f4f099507",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-http.swap-origin.http.html": [
+ "121c4e97b6753551032b346dc984ac99ee605911",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-http.swap-origin.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
"support"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html": [
- "9301f0b2719c1c025b50dee3e17f4d616944a54c",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-https.keep-origin.http.html": [
+ "c5869dc778cc0903a60195c8e02bd9541fe25e42",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-https.keep-origin.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
"support"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/insecure-protocol.http.html": [
- "7b9a33f47e4ddf38267b257bbccf70858adc623e",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-https.no-redirect.http.html": [
+ "85fc13eab5296800281d05b41f3353e1612b9563",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/insecure-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-https.no-redirect.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
"support"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/module-worker/no-redirect/insecure-protocol.http.html": [
- "3303e355a48ce49414ee404db4c3fb325753ed70",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-https.swap-origin.http.html": [
+ "bd74c1f3600096aebbe9d3d843c8fc67c6a8036d",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/module-worker/no-redirect/insecure-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-https.swap-origin.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
"support"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html": [
- "932ac4e18f99ce3025e6131c83abb0c2b5ed08cd",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html": [
+ "8816e074d98cca5071a8bb069dc8d7cab4352c3c",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html": [
- "32dac4bf4face0907dfade7a7611bf1241fa0f18",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html": [
+ "b24b847bd607fa862b9645c7c9e1b49ee8d691e7",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html": [
- "88a6f0b3283fcd5b79f56dcb0b3a669d69de4bf5",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html": [
+ "7e30815d9b61445ae992c45078433f11a6809a75",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/insecure-protocol.http.html": [
- "0caca74b53db5af13c73ede1ee6eef0beb50179d",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html": [
+ "b44447b143edffbda8b3cf49fe4b832af0f536d3",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/insecure-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/shared-worker/no-redirect/insecure-protocol.http.html": [
- "f6215762acb1a2b3e3f433bb69dbf124187492e7",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html": [
+ "2fb45874a1a2235ed0520711a721c0063705a576",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/shared-worker/no-redirect/insecure-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/insecure-protocol.http.html": [
- "35123332a8a172ee519ccc84ee1bcd0edec0edbf",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html": [
+ "8a075efa0879c8bc37c960eb43d891e4c7d5f52d",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/insecure-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/worker-request/no-redirect/insecure-protocol.http.html": [
- "757b06bc6ac19648da21567e9798bf97702115fe",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html": [
+ "a2108d0858d26ffe3dc3a6d1930c4a66a69a0ded",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/worker-request/no-redirect/insecure-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html": [
- "3044b007cd99a4e6b7d826c8cd8de93714c6e6a6",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html": [
+ "ba8e55344ab70ca0f34d169e71d217c1ecc656e5",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html": [
- "2f61fa770d7a0412aa27e42e37c0bd107fe19f77",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html": [
+ "b1aec995339bada03e0480ccf9ca768d07a21ba7",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html": [
- "fbbb9efd93314b01713230fa4866eb78f7b05141",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html": [
+ "b8676f6fcb226c9e4312a5d18873a19015442b7b",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
- "93479418ab5901ffe893b8c15d543834dc636e61",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html": [
+ "c4d1fec0f7697de0fdf2d8f30192de37e80fb731",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html": [
- "8a6ba540eeace78cc19fe0d31270ccb8bae4333d",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html": [
+ "48ae72274dcba10314dc25734cc193e755df78fc",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html": [
- "de595abdedafa82b1c7b89acb49c112050209dc8",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-http.keep-origin.http.html": [
+ "3b5c6087ca7d23daef1897071a7c8f82726049de",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
- "support"
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-http.no-redirect.http.html": [
+ "777b6de1ef037f340cebd821a4b120bd0cac6f06",
+ "testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html": [
- "07a1ddc3a026b285d641b47cdbb7947b8885aa78",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-http.swap-origin.http.html": [
+ "ddb55bb3adf9d8090f6d5131048799735a504e9d",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
- "support"
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-https.keep-origin.http.html": [
+ "c663c20976705c83a62dbea6ecc35274a004132a",
+ "testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "47c96588dbffdfdd242fc4df55e4e54213df66a1",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-https.no-redirect.http.html": [
+ "5d7b3c942502df94cb354c8e9f2b28907ef79c18",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
- "support"
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-https.swap-origin.http.html": [
+ "0eb10a224b464bfef1a8e5c698a47060515de9ba",
+ "testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html": [
- "e047b17d41185bc9da7f6cd5545dc5cbe3c36688",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/same-http.keep-origin.http.html": [
+ "e413286edeb151f4934992f9c7f31e64a977915a",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
- "support"
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/same-http.no-redirect.http.html": [
+ "5e2e08f3a755c7c55418316580bdb7e58710b187",
+ "testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "404e18bd65477000532feb28c32efdfb6e6c22b8",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/same-http.swap-origin.http.html": [
+ "433bae3c5bbcf5c4382445a5ab9f3c8404d00074",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
- "support"
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/same-https.keep-origin.http.html": [
+ "762b46f345f1b6f523d897089782c5be8b13832d",
+ "testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "246db4570357c1fe090483b95a748c7b22a4db64",
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/same-https.no-redirect.http.html": [
+ "27e5f716b3a0ba36d2b3e7325887f76c7c8668ef",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
- "support"
+ "referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/same-https.swap-origin.http.html": [
+ "687598c5f559f713c40c6ca42c8c72ee03f0b46d",
+ "testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
- "0a2a0f026c63a95e8e6c26623ad52800cb210ffe",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html": [
+ "0b035d26e380f2c60df65b3c26b1b741d725d432",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
"support"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "b35d8f7f4f1d7d434080dae8d3df7f1d2990d6db",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html": [
+ "dec56bc9a0d305a1dbabc1d6214a9c88f04059df",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
"support"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "aee79e7279e15a70845009cc802bcef41d36f7dd",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html": [
+ "64cd66eac68212a1f80f4dfeaf473b88fb0f703e",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
"support"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html": [
- "e1ae930f78b59ff18765f3c29a19205bfea9b4dd",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html": [
+ "15e60b67956df7eaada3e0f6b0f1e43e393ebe6f",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
"support"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "5e871b806598baf512faf339ce95ecb7b361a420",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html": [
+ "c0d07f85854480d6d5995522c235aee2502f9390",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
"support"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html": [
- "c606d407a3dbff162c084ac11ca1ff9bceffded5",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html": [
+ "e53ac5124410af783eb8fa465be4900dacd5b3a8",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
"support"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html": [
- "bb9ccab8126606353374ff9bb0543e828d19841c",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html": [
+ "cd75aa203ebe6b4218a30730ed2e3134ceb4a701",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
"support"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html": [
- "4544ade5134d735786244e15e0373171663bf1a3",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html": [
+ "9be0bf3fadd50ea056ecfbc88a643f1419e8a314",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html.headers": [
- "f2152da955f3295aec2ac05adc2357ac7629cf7b",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
"support"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html": [
- "14d891c6ca0a6fafb699ab3f41111d1327507838",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html": [
+ "4c3708d687f539201a97dc3d4e32a21e2a7ddf9c",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html": [
- "7205b5b5e20afd7529acfe3973b755bd9f9e34f5",
- "testharness"
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
+ "support"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html": [
- "2bd7f7f9f96c7af26e1b7ac7e237f31e863a2feb",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html": [
+ "bf27bb461610a08ec4f04878845a2cac58fa07ff",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html": [
- "6c941b98affe9791cef3d5a87166e3c0bf36c571",
- "testharness"
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
+ "support"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html": [
- "78a12c0faf78d315935f1d2c049d47e20d9bf534",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html": [
+ "5a9c1cdf3869d078086d19bb824ed337a74a09ff",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html": [
- "8cb3b1da63c48298276ff3ec6749fc2df98e844e",
- "testharness"
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
+ "support"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html": [
- "98b574b0334f1ad7d2d123182f9a5c4c1279db06",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html": [
+ "c424f516c3ba0bc38d0005b94fdddd1704cd6f03",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html": [
- "f6755e99add4f8a615fa20645d01de2511c82563",
- "testharness"
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
+ "support"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html": [
- "9ee1de48295f458eba00147cb56171c95e16c428",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html": [
+ "67f97ec87be8d6c2ad861b8d43aba3d747dc6a8a",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html": [
- "1f0b254a2a1b236b391c1f8dcaf7a95c9e9f246c",
- "testharness"
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
+ "support"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html": [
- "85b47db7c49082f36a4baec85a5d58db52cbad0a",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html": [
+ "54429d45e45fccfbec52bfd7fe8a1d6b21f73e64",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html": [
- "e2b6315eed71a4ce1b0c46a125e306bc3839ca86",
- "testharness"
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
+ "support"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html": [
- "8cd18a658d0b849b47878d96ca987e6e80104481",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html": [
+ "b756a252c4475ab23e1ec1cd79f0e8cc5133e7ff",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html": [
- "db8b65c9070d18eece1e03102c704d19e6e9ebe1",
- "testharness"
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
+ "support"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html": [
- "b37fab1c7d1e4cda18d7527624110ab309d54975",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html": [
+ "41916d9334f8cfa97365d9462679502ba89b056f",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html": [
- "a8967e2f0077d43ff01615404f7e30a32890d12c",
- "testharness"
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
+ "support"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
- "0f512823e8e0aff1dc30b0a5502209c7f345480a",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html": [
+ "b1601e51a5fc9545d7486b93212161aa6e954cde",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html": [
- "1a7931b10169f9716cbc23a3de83dec208227151",
- "testharness"
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
+ "support"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html": [
- "7c80c012b343737c9b7a21baa2a03a745f189812",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html": [
+ "f70ca471457bf8c9bb1d2459741119b5f7c16a97",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html": [
- "221dfb63ef9542615e7f36c64f009386332628df",
- "testharness"
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
+ "support"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "6373a785fc27360812350738eba09cc2ff1584e5",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html": [
+ "b4f872261826611a2a55888b82995550f0356a59",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html": [
- "20f91bbeb1d06a4aba31ba8c1e505b4d60659402",
- "testharness"
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
+ "support"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "c20b8e0eff6abed5af6ad34d2493a4abb0f013eb",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html": [
+ "078d1f15e0ced4a45d2ae11fde26455937dfe3f8",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "44b8145030a8405d45d1b6f8ee2289d6b6b9d997",
- "testharness"
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
+ "support"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
- "dde31a65bfcb1601ad5d90fbffd44c19d9b0ce6a",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html": [
+ "da81f5061c6f13ef023564b44a9d3ac65aa42049",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "98d1e9812043b069927a4cce24602ed353f2cd1f",
- "testharness"
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
+ "support"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "e6f1a3e27c8c8e3532f6ecb42c70845ec4a1cf52",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html": [
+ "aa7f4bda7edcbe926e9c740ab32c6a5559266d4c",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html": [
- "4737eb59404d345353e3902e669cbb57115f76f7",
- "testharness"
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
+ "support"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "41018d5e2c0495c6e37dafa63810837fafe43f41",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html": [
+ "9ee83c852c9d5a70dac096c4ae62ab8f3809d8d0",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html": [
- "adc9f952d66a29c6c0f96f7e304e526eb1bc5fb4",
- "testharness"
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
+ "support"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html": [
- "2210516aecae7941279fa49f01b78630ecc383b1",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html": [
+ "cb6e6ff16bdfa45a65d67552d7ab6652355af4d0",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html": [
- "43fab7d570182abd7b704868cec9a94a3db92939",
- "testharness"
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
+ "support"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html": [
- "6a5f3c4fcc596b42e5526074503660605fd05b93",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html": [
+ "282c1793384fc6f999aa8327fee9b3c44d045ffa",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html": [
- "1f280d02fb431008f260f9de8d3ec7f72c3e3063",
- "testharness"
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
+ "support"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html": [
- "603daa98f176a1f22da1eeb30e5ca3d5a719c7df",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html": [
+ "8cf052f45be70dba406f76373c35df4a302e21b8",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html": [
- "6ce64e62d249e7560e0f4e415a541dbaafee04ef",
- "testharness"
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
+ "support"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html": [
- "93075883216d0535c58d56dc2a3f6e22590cdbdf",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html": [
+ "15fd0d762a1da46353d30551489d676b3148715c",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html": [
- "ef700be75056d90db09ec3a11116d7f5ac443100",
- "testharness"
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
+ "support"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html": [
- "070e6a8817de43ed65f46342397c32ccfc940bc4",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html": [
+ "6c7249285246b4b67477fa25926b374424a13d9c",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html": [
- "7784873f7f3f7d5010b5fb863a299d1bbec631c1",
- "testharness"
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
+ "support"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html": [
- "917c0b88847819501699fbe6ad08a051733f3376",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html": [
+ "8b2487bc3c11c72c7c8a5a5358226d1f64e0d302",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html": [
- "a00848a63ec75e51160aefc01705414596466ecb",
- "testharness"
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
+ "support"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/module-worker/keep-origin-redirect/insecure-protocol.http.html": [
- "f75b72157f4dbe42d31ae3cc3a31971c7965b291",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html": [
+ "97857ee903a21dd770095b2f6b5b0752e8c8e987",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/module-worker/no-redirect/insecure-protocol.http.html": [
- "f6367edbb2295c0a9a054ac06cc6a720a9ec04e9",
- "testharness"
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
+ "support"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html": [
- "c603a42b7c599186476d79d8d37869ef13a35d40",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html": [
+ "a5d151a9eb49dcaa41fb25d0a90f77f6487b6424",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html": [
- "6d303558e7ab66aa5f4a1d7124514f20815b8518",
- "testharness"
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
+ "support"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html": [
- "4436fc516bca5dea59515170474d683d5f51ed00",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html": [
+ "b07400aa18a097d6a0399d518d0fb560ef56b165",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/shared-worker/keep-origin-redirect/insecure-protocol.http.html": [
- "20047defd66fbca528fe66b0ad022aa131e40c0f",
- "testharness"
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
+ "support"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/shared-worker/no-redirect/insecure-protocol.http.html": [
- "966abff838de5cf46e77fa9b4aba9f8c900e2cf8",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html": [
+ "dd3bea4a79bfe8b5367775d1f0f9f9c200414796",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/worker-request/keep-origin-redirect/insecure-protocol.http.html": [
- "c6ee143fc889c80d59bc995374de5571f4f35e60",
- "testharness"
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
+ "support"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/worker-request/no-redirect/insecure-protocol.http.html": [
- "7e239d69affd311f8f89ba10f516627382b44c9d",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html": [
+ "485b6592c14fde22d268bbdfe32944541346f6d9",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html": [
- "31c3b79a581af0ab640f99b23c07c30bf23f636e",
- "testharness"
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
+ "support"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html": [
- "6eed03783b28a6af643a4ee15e0e84d4d0308036",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html": [
+ "861b00b2d9159a79bcff286c15182dc0caa73bd1",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html": [
- "61a5e51e637989de96a29ca6e3d4766747e9eca9",
- "testharness"
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
+ "support"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
- "ebb93af5050bc08a0d6eede2fb8b83f3e9d27977",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html": [
+ "480f7f1a970baab4e20e27bd2ce57ede2a9ed424",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html": [
- "7699f0f96b68014ef64861c20b42580543f56c5a",
- "testharness"
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
+ "support"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html": [
- "12f4286f8d8fd23ad13774f99658556aab2e3525",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html": [
+ "7df7be8a5301243473af666a1764c86f39510423",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html": [
- "e44a4fc096e5d6a5e42330ceb4ce0f5bca850321",
- "testharness"
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
+ "support"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "6a338aa72ce3c11f1cb54fb20ec67ec3b0643a87",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html": [
+ "f40eaddf0f9e223bd1e7ca17b27cada2275208ff",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html": [
- "5c81707fb553feade3e1e8d1be5d31927893c960",
- "testharness"
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
+ "support"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "90c65ae6e87e80cf4c140bafa98d68168f7cbae8",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html": [
+ "aec116e896bb58e3fcd72fe01f59497fe31af88b",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "f4bdee5ce8681848e3add2ec9836f62991c93279",
- "testharness"
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
+ "support"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
- "5e12002f256403ce8c705288c4f355b46a1a6965",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html": [
+ "89a479c00e6f2f05579c313c83cb83d0085c4206",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "134f342965ed71e8dbcc1d25ae265561d9302e85",
- "testharness"
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
+ "support"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "ee71a0d6f04d7ba4669293235131da30401db251",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html": [
+ "2414af93892b894d4290ce15b41191fa0b5b4549",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html": [
- "efe2c0d2f95566129454401f2830040f21efdb7a",
- "testharness"
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
+ "support"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "83ca90175514b516532cc3b609fdc89c6a577b78",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html": [
+ "0dda649cd20a94f0bc673290ef9aef04e9e6b547",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html": [
- "c902ffc410fffc0653d88289413e77834239f26b",
- "testharness"
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
+ "support"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html": [
- "7bfc76565764d7e991e8d44929c3f5319b060501",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html": [
+ "73a715bbcc4316ef982bf4c0c80d20f49fb4a625",
"testharness"
],
- "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html": [
- "c85180f01e189dc00153ccaf820da6cd35390565",
- "testharness"
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
+ "support"
],
- "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/a-tag/no-redirect/generic.http.html": [
- "d0ab6e1ccbef74310faf625f60d9af70d72bc1fd",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html": [
+ "b858e2be2cc8e46bb5a15d94ba29f05c059cc0d5",
"testharness"
],
- "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html": [
- "8f5b1a70b2142dfb6320ae13d44c60b2cac64b2d",
- "testharness"
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
+ "support"
],
- "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html": [
- "086c8b1a047cc3ba7e61205a60206e70e993466c",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html": [
+ "cdd4ddf4ce4aa3da984a2071973bcaa81b1485f3",
"testharness"
],
- "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html": [
- "d0e05376f09fbadadda908b63a078e32fbd7e051",
- "testharness"
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
+ "support"
],
- "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html": [
- "74ed8a8903d259d0d87b1b3b533139f5d319b240",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html": [
+ "b7836bba091f7e7f1b3514f538a6e0152ce0413b",
"testharness"
],
- "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/img-tag/no-redirect/generic.http.html": [
- "41a4c940c123b583128beb4108ba9b3015831712",
- "testharness"
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
+ "support"
],
- "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html": [
- "37879ce158dc1f54d51f0c55ed0e13e56f0fd2fe",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html": [
+ "855006c31d967bd2008a3befb9782c2124700cf4",
"testharness"
],
- "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html": [
- "7bab6eff28eabbc0d69644c50a19187d35833fb4",
- "testharness"
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
+ "support"
],
- "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/script-tag/no-redirect/generic.http.html": [
- "b874f1970b1bca5501518450a7bb010564e39037",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html": [
+ "eceeb454721096b80844442bb430b5a1a3e5f556",
"testharness"
],
- "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html": [
- "ce4957f92f0627ffbb6671041b6542c0f178d110",
- "testharness"
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
+ "support"
],
- "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/a-tag/no-redirect/generic.http.html": [
- "08dd0a18a46d224e8b1cec1af6c5457ce4d58d36",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html": [
+ "024396c44f371c9504f435758f5e64b6eb92337d",
"testharness"
],
- "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html": [
- "d940fe023d54829d7ed596fed8cda5494443aa1c",
- "testharness"
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
+ "support"
],
- "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html": [
- "ae67228e393ee75705d7bc4ec3d5d2f1f700b847",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html": [
+ "a047bf3477babd476508e3108633b95ba20686ac",
"testharness"
],
- "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html": [
- "edb49e27f2373a118de1577cbed512295881f4a3",
- "testharness"
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
+ "support"
],
- "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html": [
- "f48a02175888868fb4c780ccd50b6912e98bf9d0",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html": [
+ "ba9982d8e7c67627f6a6d70e209d108468c690f6",
"testharness"
],
- "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/img-tag/no-redirect/generic.http.html": [
- "795774b4006be2c6bc9a0b97ae1dbdadde07945e",
- "testharness"
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
+ "support"
],
- "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html": [
- "8d4143e4ab99b882344ef6834c6f19349d7a42c4",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html": [
+ "c7de2e6f0f2309380c54112eeae01a8d6c9c23b7",
"testharness"
],
- "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html": [
- "68547fdbb73d4ee73789d666e7972c543a14ad48",
- "testharness"
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
+ "support"
],
- "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/script-tag/no-redirect/generic.http.html": [
- "acf4458a1689b5c795a95eba30e6edeee0aff946",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html": [
+ "2884fcab6ef01c43140539b1d926a8eea256be3a",
"testharness"
],
- "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html": [
- "6f57c7c4b2b9558f11798154d188bb686f6ef00e",
- "testharness"
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
+ "support"
],
- "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/a-tag/no-redirect/generic.http.html": [
- "e2404361ecd2bbb8706856973981bc90bb249e6e",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html": [
+ "31046accc2753a65d1d2bfce98ea6e3f35f9af9a",
"testharness"
],
- "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html": [
- "66660f05264a01cfdce44bfd97a038779e88e6a5",
- "testharness"
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
+ "support"
],
- "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/iframe-tag/no-redirect/generic.http.html": [
- "15e978254242857952ad19120cad564ef067c1ba",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html": [
+ "fd4d4237c0d1e56be101100b31faa3f1b77948fe",
"testharness"
],
- "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html": [
- "f5e38ddb803aa273661507ba2a42637341779fcf",
- "testharness"
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
+ "support"
],
- "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html": [
- "20dfb8a3d66188260044fd662a9f3f149f074fa6",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html": [
+ "262d8d249c4cfcc6d11defe1f7e7444eaa70b671",
"testharness"
],
- "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/img-tag/no-redirect/generic.http.html": [
- "661a0cb964cd6b0b14f7a277c870bfffbd7353d8",
- "testharness"
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
+ "support"
],
- "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html": [
- "4705a1988873dac499172e22df4f36c344398403",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html": [
+ "819e7d249b05ce6ad724b0bf0f1988e4c0fa3183",
"testharness"
],
- "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html": [
- "66310f711b537dec29306f740c8cb5f5b53da190",
- "testharness"
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
+ "support"
],
- "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/script-tag/no-redirect/generic.http.html": [
- "79be70d7587779fcfd23529c9251da339455790e",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html": [
+ "5bb5c51368257ac21a7a02d66327ab2651fb7de8",
"testharness"
],
- "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html": [
- "d3a7d9627f3b57aa3e07d62e4b943dcf9a17772f",
- "testharness"
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
+ "support"
],
- "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/a-tag/no-redirect/generic.http.html": [
- "4140287d37986189912e979a0a75b4e627e2c8b7",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html": [
+ "558c333c2c31a07fdfeaebe13b980e7203125e3b",
"testharness"
],
- "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html": [
- "0816608f10f042d610c7c469a5864a7bd499ca57",
- "testharness"
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
+ "support"
],
- "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/iframe-tag/no-redirect/generic.http.html": [
- "4af019d39fb30048889d743c6f9653451327524f",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html": [
+ "0bdeb265ae967ac6543563fe805a8163a4a88d3e",
"testharness"
],
- "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html": [
- "fde81606e41dcf5948de750eb57272b14a6133cb",
- "testharness"
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
+ "support"
],
- "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html": [
- "930a9c1450c6133a6df2d1eea83cb9a5fa5a4022",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html": [
+ "fe36ce6c7fad7817a4549ca061f4a79a8493d03f",
"testharness"
],
- "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/img-tag/no-redirect/generic.http.html": [
- "8d08d63d72816a0814a639fd708966c0a921ebbb",
- "testharness"
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
+ "support"
],
- "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html": [
- "dbbc89ead389bafce662b3444d7411fc17db4a1a",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html": [
+ "9631d04e25935897d1acbc7389b913872beeb85f",
"testharness"
],
- "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html": [
- "a190ee179384a86a74ac1ae3b901010c5a984d30",
- "testharness"
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
+ "support"
],
- "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/script-tag/no-redirect/generic.http.html": [
- "3a1d16bec4e29e788a970864066efb681b38ca79",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html": [
+ "c9d2e50d8c9871d8ebe4d81a0af0f1b4f94179c0",
"testharness"
],
- "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html": [
- "572d84007c955b07ee118f90ce179646dd9bf1aa",
- "testharness"
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
+ "support"
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/a-tag/no-redirect/generic.http.html": [
- "c1a8a0a0bc23076f71a86da443b196a11377cc10",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html": [
+ "6d85d0baea23dd87f5607e2df6356c073367dcc4",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/a-tag/no-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
"support"
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html": [
- "c5726ef3701ce5a800c7aa4cfdce28022b87133d",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html": [
+ "6586f1ffe24650494bd28b214dc48be72702379a",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
"support"
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/fetch-request/no-redirect/generic.http.html": [
- "a851d5bd81852bf0ce2336cd28a88fc17711c19b",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html": [
+ "2e98a6433471f6e56eded80589cbd38dbe3f095d",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/fetch-request/no-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html.headers": [
+ "180358e691bd449b825e0c8f199d919dbd90c270",
"support"
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html": [
- "54e6d02028178da90c8d2b534619f43ee2d70746",
+ "referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-http.keep-origin.http.html": [
+ "408834c03d724826f0efe22a6dc8d740c0438cd3",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-http.keep-origin.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html": [
- "8250944c36f9ceb567215864c1c33a769f0de702",
+ "referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-http.no-redirect.http.html": [
+ "a2f92d657a594db4143dc8c0b0afd4d060d5cf7f",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-http.no-redirect.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html": [
- "df0fe535c15765f5356c92c06132f1df8616c27c",
+ "referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-http.swap-origin.http.html": [
+ "51c29e644d93d5922ff4f221279152ea41198301",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-http.swap-origin.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html": [
- "e56f9107aae879bab2c5f35c2a045e7639366960",
+ "referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-https.keep-origin.http.html": [
+ "d0725a2557a0d787406fa03be8e7fb2259160eca",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-https.keep-origin.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html": [
- "a47e2e0c615533ee25895598be4ab62b5488d6e6",
+ "referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-https.no-redirect.http.html": [
+ "c33acb3704aa23c90a83808a9c65e987b9b7506b",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-https.no-redirect.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/img-tag/no-redirect/generic.http.html": [
- "3dd2c1247dcfea7cd93bc2087da3fafe0d5f9193",
+ "referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-https.swap-origin.http.html": [
+ "48c549827f6072d3eb69ba6c6d326347276b8c02",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/img-tag/no-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-https.swap-origin.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html": [
- "256db1aa5849b8a2b885ae07e3bbc8578fd74a8a",
+ "referrer-policy/gen/top.http-rp/no-referrer/fetch/same-http.keep-origin.http.html": [
+ "853b7ef4836224e21fc8c1a724bfba4c2886566d",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer/fetch/same-http.keep-origin.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html": [
- "7c05f53f14fc5ab58fc26f855c43a2206b9bc512",
+ "referrer-policy/gen/top.http-rp/no-referrer/fetch/same-http.no-redirect.http.html": [
+ "9d4cac3345eb2c5c2928bf82fa7664e5c59b281c",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer/fetch/same-http.no-redirect.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/script-tag/no-redirect/generic.http.html": [
- "83a91abf2bd9cb353da80067c585c8b3d065887a",
+ "referrer-policy/gen/top.http-rp/no-referrer/fetch/same-http.swap-origin.http.html": [
+ "c89a33c4635b0de80d337a51f496c2975bb76e7e",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/script-tag/no-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer/fetch/same-http.swap-origin.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html": [
- "461fce61eef2632281db50903bf79a5692ad42bf",
+ "referrer-policy/gen/top.http-rp/no-referrer/fetch/same-https.keep-origin.http.html": [
+ "3db4fa975f08685a6230479e30775fe6bb2f95ca",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer/fetch/same-https.keep-origin.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html": [
- "9d5a65e3171a4a170d55805702c241741caaaa5f",
+ "referrer-policy/gen/top.http-rp/no-referrer/fetch/same-https.no-redirect.http.html": [
+ "29f691c70ff9d16583c4dbbb1bd98ac5fb5e2939",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer/fetch/same-https.no-redirect.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/xhr-request/no-redirect/generic.http.html": [
- "2691218635125993c3dff3c307a895dc133d1338",
+ "referrer-policy/gen/top.http-rp/no-referrer/fetch/same-https.swap-origin.http.html": [
+ "7e27944515756afd9425a9cac927deb7a0f3d439",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/xhr-request/no-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer/fetch/same-https.swap-origin.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html": [
- "d67f6bdbfba04380e6b72188d9757f0aac7a19ef",
+ "referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-http.keep-origin.http.html": [
+ "e7c08bbcaf9db741ff91436e27b260d3d3b769fb",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-http.keep-origin.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/a-tag/no-redirect/generic.http.html": [
- "e1a27e3fbae7587f7bb8c921f86239a65a8cfcc2",
+ "referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-http.no-redirect.http.html": [
+ "69607cb07786e074605bd7850ef7924eaa61dbfd",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/a-tag/no-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-http.no-redirect.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html": [
- "bfd73c92dc65b50efc922f48ca34e1762e8568f3",
+ "referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-http.swap-origin.http.html": [
+ "d7d0ba3b381b497eb9994c677b87636bfe24b7c8",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-http.swap-origin.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/fetch-request/no-redirect/generic.http.html": [
- "4b61d4478a52a60bf3f95add7677752ec4cab129",
+ "referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-https.keep-origin.http.html": [
+ "47c57013f44880515b670830216cf7ead3a6da9a",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/fetch-request/no-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-https.keep-origin.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html": [
- "eb4e0b3414d0511e36f9fe370e6e41398b5322e8",
+ "referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-https.no-redirect.http.html": [
+ "4e3bb1a06fd89c00c5ea7de98c1634a908ab5d7c",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-https.no-redirect.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html": [
- "7ebd1199cc17c7c43279da621ce8f36f44954364",
+ "referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-https.swap-origin.http.html": [
+ "5a7ab10c4130aaace0289ce52bb816f91b4b84da",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-https.swap-origin.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html": [
- "4567526881470cceaa21e2086f6c306a069402da",
+ "referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-http.keep-origin.http.html": [
+ "7f1d12f1079ba145ea277d4c7a0ff93d970ba42d",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-http.keep-origin.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html": [
- "fecf19ce75a9c890a0661dcdc9366991f121d46f",
+ "referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-http.no-redirect.http.html": [
+ "1b06a5a9545177720d8f8ba18b823ebb1401e507",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-http.no-redirect.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html": [
- "8a07db8736e2acc769c4c7fac8ac54b7d5dfeb78",
+ "referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-http.swap-origin.http.html": [
+ "e6c56b11744590a22a1a2af13838589c403cbabb",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-http.swap-origin.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/img-tag/no-redirect/generic.http.html": [
- "ab0b3501c392ba16fa2e0aab9e09b6fc63f67842",
+ "referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-https.keep-origin.http.html": [
+ "ddec0c50687507b13e2ea51fb691ca8bc4e9590d",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/img-tag/no-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-https.keep-origin.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html": [
- "3493ca250b8bc0a4cad9418e707e2b539bdfb924",
+ "referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-https.no-redirect.http.html": [
+ "3bef6b38ae81ff6aaf7574bb72daa55f8e455d72",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-https.no-redirect.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html": [
- "fe714d038bc38868b036bf5fa346c8db5e910995",
+ "referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-https.swap-origin.http.html": [
+ "c355cc7b41ee611d05e34e482d49d98504bb412f",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-https.swap-origin.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/script-tag/no-redirect/generic.http.html": [
- "82002683fc994d4d6185beb62d7daf4f5feef43a",
+ "referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-http.keep-origin.http.html": [
+ "044a0013137bf4d31df4b1c8621b06abe5e286f6",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/script-tag/no-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-http.keep-origin.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html": [
- "f84861f792a43b3b0e3228defe7e8202320b1f29",
+ "referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-http.no-redirect.http.html": [
+ "bdb0050f72802ce4de9f30048fa2693056bd9b4c",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-http.no-redirect.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html": [
- "8482c8ae977814983da5e706d92f8e3f650ad750",
+ "referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-http.swap-origin.http.html": [
+ "02a0f7364593ffb180d2ca8115b19c34a727c007",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-http.swap-origin.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/xhr-request/no-redirect/generic.http.html": [
- "48168636f4206b5f8ed17bd9a99eb1dca3f50e02",
+ "referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-https.keep-origin.http.html": [
+ "552e0de05dfa97d6c4de3e39fd26477d6c3fe322",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/xhr-request/no-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-https.keep-origin.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html": [
- "aa3455bc2df6681a97d1655a0f7c45146d4ee8c2",
+ "referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-https.no-redirect.http.html": [
+ "99bf6df035748485a1c37245a14d7b8cf8f1bd8e",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-https.no-redirect.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/a-tag/no-redirect/generic.http.html": [
- "121bfdfa4683ee7197370e56e7680f7b756d8874",
+ "referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-https.swap-origin.http.html": [
+ "bf2fd15f642180860c3b1eba4359c2445ea08dd9",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/a-tag/no-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-https.swap-origin.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html": [
- "ed2159b64735b1770a2b2a1903addcab2a42bb93",
+ "referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-http.keep-origin.http.html": [
+ "8ba7fc0528c3d7c64baf05a9a0ce4e7a0f475f97",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-http.keep-origin.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/fetch-request/no-redirect/generic.http.html": [
- "4495c5440cb36508d657fb36ab8fcccb19456bc5",
+ "referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-http.no-redirect.http.html": [
+ "200e236256b73371f9363f88991e34ab7660f450",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/fetch-request/no-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-http.no-redirect.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html": [
- "eb067ac7967f98aefae9756ba24f2d549400853a",
+ "referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-http.swap-origin.http.html": [
+ "9390f89ac8c2b195028f8b1ac21348d19374d86b",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-http.swap-origin.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html": [
- "72b43aa993607e39673fd7f2bb6739bc9f8cac5e",
+ "referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-https.keep-origin.http.html": [
+ "ea628172c34d7d0e7543a789912e4ed5e10330ef",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-https.keep-origin.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/iframe-tag/no-redirect/generic.http.html": [
- "d2cf0366dcaf91ef915401017e2db774356b9aa1",
+ "referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-https.no-redirect.http.html": [
+ "98937d42ace0dd602ad5171ca60074f13f706576",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/iframe-tag/no-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-https.no-redirect.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html": [
- "34d467754d9014e74a2be9de8f634ccb897031dd",
+ "referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-https.swap-origin.http.html": [
+ "0f5a13efe12db6723b6cd6469b6605fe4b3deac2",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-https.swap-origin.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html": [
- "637b156a282d7fbb6367a8fff6b6d0e8dda9e312",
+ "referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-http.keep-origin.http.html": [
+ "8045577914e534a0f33a1123acbff6bea0bbd937",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-http.keep-origin.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/img-tag/no-redirect/generic.http.html": [
- "ad34824d58d989bf8dcb02ab188bfb27fd8b4556",
+ "referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-http.no-redirect.http.html": [
+ "db12593a4322216ce78e50e99a4817c5e8c7393b",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/img-tag/no-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-http.no-redirect.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html": [
- "f89a079a5522fd26ca0ff369e816c521c5066b58",
+ "referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-http.swap-origin.http.html": [
+ "1c276c8fdbbea63658240db5f57af57dec0aebd5",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-http.swap-origin.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/generic.http.html": [
- "40e0fd0a8101696e5160f27f1f573466dbea3b21",
+ "referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-https.keep-origin.http.html": [
+ "47f19e9573c882e4b08526868803e18d7bc6e8f2",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-https.keep-origin.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/module-worker/no-redirect/generic.http.html": [
- "a8d3c3ed2b640feb3af9b4cdffcab8dc2b234b9e",
+ "referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-https.no-redirect.http.html": [
+ "b7aa32c2f57e913aaf2acde67ad47c3f295aa3e0",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/module-worker/no-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-https.no-redirect.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html": [
- "df047a0ff44e60da7685e4aa5018086b271a7d5a",
+ "referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-https.swap-origin.http.html": [
+ "c2b727e575a030b4128fe346ce7e9ec354eddaa1",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-https.swap-origin.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/script-tag/no-redirect/generic.http.html": [
- "6454292d6f0ffff30293b70c247be2dcc4390361",
+ "referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-http.keep-origin.http.html": [
+ "464eb4cd1b8f15560091474f3baeccfac6aa63bd",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/script-tag/no-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-http.keep-origin.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html": [
- "9a9c91976d889f51db875884d6ed2409e51858ce",
+ "referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-http.no-redirect.http.html": [
+ "1ac4dfe81db8fc7c62f65012a5e9f86edccd2d01",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-http.no-redirect.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/generic.http.html": [
- "fedae8b7f7ba3b0ddbab6c2eeba1e402e02ee90f",
+ "referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-http.swap-origin.http.html": [
+ "9d133b182e19ae1eb4ba90277bb1587b53bdc354",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-http.swap-origin.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/shared-worker/no-redirect/generic.http.html": [
- "31892705e0f4ae3f8ad112b62b1936240177ee3f",
+ "referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-https.keep-origin.http.html": [
+ "86255c2a2390b9156700b1a14d044c13b3341721",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/shared-worker/no-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-https.keep-origin.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/generic.http.html": [
- "c3981366c5d6bf4dfa44d69dcbc8e515c8535578",
+ "referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-https.no-redirect.http.html": [
+ "0d85292886397c4e15209f477ee612871eaa3267",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-https.no-redirect.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/worker-request/no-redirect/generic.http.html": [
- "daf2637065ff39c38e78456ac649f8ef3249c3c6",
+ "referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-https.swap-origin.http.html": [
+ "734134e44feaa699cd9579b22798a12cd154e6e0",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/worker-request/no-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-https.swap-origin.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html": [
- "eb5e616ecd612bb803779be517e69fbfd241d250",
+ "referrer-policy/gen/top.http-rp/no-referrer/sharedworker-classic/same-http.keep-origin.http.html": [
+ "6aeed041c1d61983f3753ce21c1308962e433942",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer/sharedworker-classic/same-http.keep-origin.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/xhr-request/no-redirect/generic.http.html": [
- "abbf8fcb9149b2baa5da1b3d3bb2911706da1731",
+ "referrer-policy/gen/top.http-rp/no-referrer/sharedworker-classic/same-http.no-redirect.http.html": [
+ "c3825ec079ca3eb6f9757dd002adc7ae7232d894",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/xhr-request/no-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer/sharedworker-classic/same-http.no-redirect.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html": [
- "b5f28d2d6715d8d3bb490158b850ec79c8277d02",
+ "referrer-policy/gen/top.http-rp/no-referrer/worker-classic/same-http.keep-origin.http.html": [
+ "db76379cc9f66ce7c6bdf5fd215243600f29f34d",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer/worker-classic/same-http.keep-origin.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/a-tag/no-redirect/generic.http.html": [
- "3780ae41833ddd01d7bcf3e790d9b2a406601812",
+ "referrer-policy/gen/top.http-rp/no-referrer/worker-classic/same-http.no-redirect.http.html": [
+ "f71ac8e8f40015e83bf256f2d29ba9cc4c792966",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/a-tag/no-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer/worker-classic/same-http.no-redirect.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html": [
- "e40426f78a8bc2c6ffd5e81fd082e6ebc40f93e7",
+ "referrer-policy/gen/top.http-rp/no-referrer/worker-module/same-http.keep-origin.http.html": [
+ "b0be8268545f5a151bbb763948102cb23704e85d",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer/worker-module/same-http.keep-origin.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/fetch-request/no-redirect/generic.http.html": [
- "a4bd83ad28451fe33929346895d7b9fc9f9c26d0",
+ "referrer-policy/gen/top.http-rp/no-referrer/worker-module/same-http.no-redirect.http.html": [
+ "475110a72fcbaa48343b1379f37ef7664177d29a",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/fetch-request/no-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer/worker-module/same-http.no-redirect.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html": [
- "6696fba26b30ad3f6638d3314bbd74d19c09b915",
+ "referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-http.keep-origin.http.html": [
+ "cfe73628d05377f9f23395b28a141dafb7e33267",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-http.keep-origin.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html": [
- "fbb4fa45f7dc5d5b56aea75a3ac47e267bc98ff5",
+ "referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-http.no-redirect.http.html": [
+ "17c0bd59f0d0603dda51cea13638e6ac2d92163b",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-http.no-redirect.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/iframe-tag/no-redirect/generic.http.html": [
- "35af16f4dcacacf6ef56335dd339dfa21d870763",
+ "referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-http.swap-origin.http.html": [
+ "a7b975cd61929f055eea3d72bbe9d59ce7269586",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/iframe-tag/no-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-http.swap-origin.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html": [
- "0c1af722041020338852a01b733db81bcd2624f1",
+ "referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-https.keep-origin.http.html": [
+ "7fff66d3a493ec2119d55b1b67a833a4b12de458",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-https.keep-origin.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html": [
- "d2bc6fd484272f99d7350bebd7d04c981429d63c",
+ "referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-https.no-redirect.http.html": [
+ "9d1fe3455158560113448681dfa593ccf237c23d",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-https.no-redirect.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/img-tag/no-redirect/generic.http.html": [
- "7cdfc9bd414cce2469ecae938c5aed125cf6201e",
+ "referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-https.swap-origin.http.html": [
+ "9edc5d8ab07736fd42dc12394e8559ab66fd7e2c",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/img-tag/no-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-https.swap-origin.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html": [
- "6a1d773f91b7df881e39ef5e06a7a1b76493f019",
+ "referrer-policy/gen/top.http-rp/no-referrer/xhr/same-http.keep-origin.http.html": [
+ "43f324a85c9393255f5f69689cf75ebed8c650fd",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer/xhr/same-http.keep-origin.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html": [
- "47c4a60aed7171e3648cc995f6191f34c1fe07fa",
+ "referrer-policy/gen/top.http-rp/no-referrer/xhr/same-http.no-redirect.http.html": [
+ "22709fed295cdd87b3b44f5da20c729817c9acfa",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer/xhr/same-http.no-redirect.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/script-tag/no-redirect/generic.http.html": [
- "9e95ed2ef1bc611fa488f9e19f329c2183bf1318",
+ "referrer-policy/gen/top.http-rp/no-referrer/xhr/same-http.swap-origin.http.html": [
+ "25009254d8e8876882d95dc9aabae80eab952976",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/script-tag/no-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer/xhr/same-http.swap-origin.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html": [
- "2a897d97add20d1f759a6e7750fc2e6da3e90953",
+ "referrer-policy/gen/top.http-rp/no-referrer/xhr/same-https.keep-origin.http.html": [
+ "6be0685716cd37678fcbad5d28b73e75e7601bf2",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer/xhr/same-https.keep-origin.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html": [
- "507432c9db1093c3803dadc418fb4697fe606a97",
+ "referrer-policy/gen/top.http-rp/no-referrer/xhr/same-https.no-redirect.http.html": [
+ "52b9fc83154686627bec2a3c94b7b5af66f5aa5b",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer/xhr/same-https.no-redirect.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/xhr-request/no-redirect/generic.http.html": [
- "1a6cf6884b9641694947065773c2bd3e028774b2",
+ "referrer-policy/gen/top.http-rp/no-referrer/xhr/same-https.swap-origin.http.html": [
+ "ef75493d593c0b5a97a8a8c5830bff38084bff2e",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/xhr-request/no-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/no-referrer/xhr/same-https.swap-origin.http.html.headers": [
+ "b3b55087edbb50ad0a371ebb45776cf9943033ae",
"support"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html": [
- "2b7beb3a4bb65c63fc672f9b49cc492df742b2b6",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html": [
+ "75f4815eb6b07655aeb3b902cf04308a6b7e4a3a",
"testharness"
],
- "referrer-policy/no-referrer/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html.headers": [
- "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
"support"
],
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/a-tag/no-redirect/generic.http.html": [
- "ba1fd4a411064963389efb295e796a45cfa8b6da",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html": [
+ "37756d8c5beeca5c3936b31cee3b39beea5c5dc1",
"testharness"
],
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html": [
- "43df09f493cbb7bbd707cc9fbda62c19836975d9",
- "testharness"
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
+ "support"
],
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/fetch-request/no-redirect/generic.http.html": [
- "346c0165cf27fcd968caf9d53b5496cd16f292c7",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html": [
+ "3ca0ed8c850d0f07876e0937467e12be8360f764",
"testharness"
],
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html": [
- "9c19546b28b39bdd5ef06ac3b1a0ef7023c5a7c6",
- "testharness"
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
+ "support"
],
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html": [
- "dc74b17006404b355ad106c3c22f64cd64ea516f",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html": [
+ "8090e7ed3787a26621e9a15a05e2af8a83d25a77",
"testharness"
],
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html": [
- "0726049eefcc9de3102576323c0e9d1c8093e63e",
- "testharness"
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
+ "support"
],
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html": [
- "93b5b91c1619a052136569e93b5738dc48044f0b",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html": [
+ "39c7104194e3592d3d3a60c716af533ce3484f70",
"testharness"
],
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html": [
- "a09e04cd22c2a723fdf60bc8573bfeecc9e3f4ca",
- "testharness"
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
+ "support"
],
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/img-tag/no-redirect/generic.http.html": [
- "9981baec4babe9416ad667f22a95a34e6d8a063f",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html": [
+ "edd61515cb39b9a9a097a513138255bfba7d6420",
"testharness"
],
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html": [
- "c2a92aa157e3240e589abf87de0620682140356d",
- "testharness"
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
+ "support"
],
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html": [
- "6b094f9b36ef7d4d1bd4f6baa6c89cd64dddda8e",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html": [
+ "6272ff9bdcf214809824c34861fae87f872af411",
"testharness"
],
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/script-tag/no-redirect/generic.http.html": [
- "fa473268c6dfa775dda317b50ccc1b821bd75aff",
- "testharness"
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
+ "support"
],
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html": [
- "2f8afbe8aed7eebb6ef6cf0684415b0bfd75458e",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html": [
+ "dca65f1663a7e1229e15c8023f91e25eb4ee9f45",
"testharness"
],
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html": [
- "65cafa2b4f93162958d97321f8ed9d8e8898742b",
- "testharness"
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
+ "support"
],
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/xhr-request/no-redirect/generic.http.html": [
- "21a268827716623a37efadf49678ae47c08dc4c8",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.swap-origin.http.html": [
+ "a262455d5cb9f6623fdf98781e9f4b57786e6238",
"testharness"
],
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html": [
- "ce35564bf9d53b15eeb5b4ed1dfd0b7daf95e352",
- "testharness"
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.swap-origin.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
+ "support"
],
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/a-tag/no-redirect/generic.http.html": [
- "80165257482017b8d00e0ecafc47097d68bf47d3",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-https.keep-origin.http.html": [
+ "586a69b543ef2a0ad0b2696428163dca49ee9b6c",
"testharness"
],
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html": [
- "47aaeb0646de93bcd665c3e8ac55a89d5a78c012",
- "testharness"
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-https.keep-origin.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
+ "support"
],
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/fetch-request/no-redirect/generic.http.html": [
- "1e3252924feecea420e152bbb7366d62fa031fc5",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-https.no-redirect.http.html": [
+ "f25400a4268280af5f6a7cf06526505956514753",
"testharness"
],
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html": [
- "e09bacfa6fd4d75aac18a8a2a4f27b8261ccf484",
- "testharness"
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-https.no-redirect.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
+ "support"
],
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html": [
- "ec641955cab30df8645164e30f9c33cf54c52ad6",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-https.swap-origin.http.html": [
+ "ef1fcf8da02cdfd9c395974d90a106a74c8fd2f5",
"testharness"
],
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html": [
- "298ed876f0ab46a3e8844a80914e69d940de2420",
- "testharness"
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-https.swap-origin.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
+ "support"
],
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html": [
- "c80d5bfd08072fc04e3345268b9254637c9f741d",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html": [
+ "f2553d67ff4763052bdd4b5150af41eb0d593b45",
"testharness"
],
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html": [
- "33451710956896b1a2d7111680b6c408b4bfba12",
- "testharness"
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
+ "support"
],
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/img-tag/no-redirect/generic.http.html": [
- "c444cb95402a7a5a85386943cf255fc4d5e0c3df",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html": [
+ "be21cda94d5ab830cedbd8d331d40c5134de6e90",
"testharness"
],
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html": [
- "8d06c867b75f9f578314c5589a0e5726dfb2fe9f",
- "testharness"
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
+ "support"
],
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html": [
- "6b4d7aaf3d0a8a53025f314601efdff4353871d3",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html": [
+ "477481d955f22a92578a194fb19b9bd32dc993d8",
"testharness"
],
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/script-tag/no-redirect/generic.http.html": [
- "02f1cec108addf48a5d5c9559cd78be1fdc541ac",
- "testharness"
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
+ "support"
],
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html": [
- "3ab475dd62f5e044fa49b8783c5596283ddfe3a1",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html": [
+ "7c74c301a923dc8846bb76573baec7202363213d",
"testharness"
],
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html": [
- "180cf23b63f086ef455b7cef74122d507e6e460a",
- "testharness"
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
+ "support"
],
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/xhr-request/no-redirect/generic.http.html": [
- "fb63204561f0cec851fc1bf1e3ab441ad5f358ba",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html": [
+ "b83ae5afb165ba953ca9fe2f3b021dddcbe7dc70",
"testharness"
],
- "referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html": [
- "856c6e24e13abad4dc2522d208e29e7e74669932",
- "testharness"
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
+ "support"
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/a-tag/no-redirect/generic.http.html": [
- "96ac4f9de15e784b4d8143c753a3f81d49c361c4",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html": [
+ "3b87e0e1ee4f4fb727768800fec646b0af91cc48",
"testharness"
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html": [
- "1fdff5963da31722727d5c3bf07ce9a376b552d3",
- "testharness"
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
+ "support"
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/fetch-request/no-redirect/generic.http.html": [
- "05c28a5475dda06425d39f1307f14dff44192751",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html": [
+ "b34218514f0a32b28b434ce65d035e8ab4148976",
"testharness"
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html": [
- "c60ecc104a842fab7f4312da88766fc70499cb2d",
- "testharness"
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
+ "support"
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html": [
- "8d81edd0440690e8d5b47a02aac657506dae6e9a",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html": [
+ "7b9551f94f9e345db33d653b8e58366ced80b524",
"testharness"
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/iframe-tag/no-redirect/generic.http.html": [
- "a5a728cf86bbe8e08fe25d7e80490a6c00b5c063",
- "testharness"
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
+ "support"
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html": [
- "df4f87235d0a254751d783d2c94468903aae27c8",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html": [
+ "b3c8f8bc7b71f1ae5b94a3cdacb0086842330da6",
"testharness"
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html": [
- "ec0a21e2db1347f1193675ee6b441351f7b35663",
- "testharness"
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
+ "support"
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/img-tag/no-redirect/generic.http.html": [
- "6255a8d29cfb3c1c9a73b1e3afe03bd9e62a969d",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html": [
+ "e3549e3092e04fa966f1c4de84ec951eb14a8f37",
"testharness"
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html": [
- "b878f3839f2423e6e9461eef3ecfff98c4364dc3",
- "testharness"
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
+ "support"
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/module-worker/keep-origin-redirect/generic.http.html": [
- "2ce35a6ee3cc31d1ba5d3f92d6ef152199ef272f",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html": [
+ "86d8dc5a296a283d7ae21628c76839955a2ba81a",
"testharness"
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/module-worker/no-redirect/generic.http.html": [
- "bde8e0f0d13852746fb3e66031865fa1012067a0",
- "testharness"
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
+ "support"
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html": [
- "6b5ea62e345c491b93794a23620679a437cdd53a",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html": [
+ "e676ab9142477e5e83040c203f85d8a56315f52e",
"testharness"
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/script-tag/no-redirect/generic.http.html": [
- "b39c40d1698f15538b3d1be65d230181d2edcd1d",
- "testharness"
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
+ "support"
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html": [
- "ba4fe78409f3d99a4573ac34c4f02270c3ce853f",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html": [
+ "ed27eab67b06e7529b7dcdc9e4cf497f3230bd3c",
"testharness"
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/shared-worker/keep-origin-redirect/generic.http.html": [
- "9b6574020c65557f1fd3d43882409e824975ca69",
- "testharness"
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
+ "support"
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/shared-worker/no-redirect/generic.http.html": [
- "544426d28c6ac3105b01b5426b9c6ef4bf4ef0a2",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html": [
+ "a4f111ba329f3aa92d34466eabbe010ee2636fd2",
"testharness"
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/worker-request/keep-origin-redirect/generic.http.html": [
- "833d0f69136307fea2190ac10ad701409fa8f5b3",
- "testharness"
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
+ "support"
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/worker-request/no-redirect/generic.http.html": [
- "55709bb0db26860b979631cdab9faafe66beaa76",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html": [
+ "23dbc764034ec63d555908e7a796c02051714aa9",
"testharness"
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html": [
- "a4919c0f7dc086fb9899787d3dba55ca14d720a8",
- "testharness"
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
+ "support"
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/xhr-request/no-redirect/generic.http.html": [
- "9da55918ae3840f81eefc6b14606257fea9f925e",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html": [
+ "b09a25e8006248c86b09337ad8d9d6a027f50ad5",
"testharness"
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html": [
- "9884fb1f072f4b750524f93d7bb6d0c1ca60c875",
- "testharness"
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
+ "support"
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-https/a-tag/no-redirect/generic.http.html": [
- "01179a3fab96518fdddda0d4b42f336658874950",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html": [
+ "40453628c96bd394399feaf61ae7f51db8ac3830",
"testharness"
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html": [
- "5a27c133476c8140e5aa5c972821e28665c52588",
- "testharness"
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
+ "support"
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-https/fetch-request/no-redirect/generic.http.html": [
- "915801c177d81b35da87ed448c21aa19e4a45633",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html": [
+ "548a99f10bc5996c832858149226630cd0880777",
"testharness"
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html": [
- "504092c875fe6d3f56866192eadf86bfae8a0162",
- "testharness"
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
+ "support"
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html": [
- "f128c96d648357100d43c1a7b9c054957b73e162",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html": [
+ "ae909bd86848470366e241fa389ee6675fa402b2",
"testharness"
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/generic.http.html": [
- "9ffd13b1c9fe713ae6c1d78a65ac3b369e4cd42e",
- "testharness"
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
+ "support"
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html": [
- "c3bc40e34b88bb5a2f5fb9c3e20137554b21aa83",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html": [
+ "4bb4990a18c94564962ed81897099db6237a1df8",
"testharness"
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html": [
- "5072cbcf152f74bc9fee63a69c514d1d984987c3",
- "testharness"
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
+ "support"
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-https/img-tag/no-redirect/generic.http.html": [
- "6941a3a73a35a8380b5d738588f84a7172ac51bd",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.swap-origin.http.html": [
+ "45781d6ccd8915bcd17f9fb4a49fa89f9e991ec4",
"testharness"
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html": [
- "cf296add12bf0872948c65bd8042cd1e74869100",
- "testharness"
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.swap-origin.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
+ "support"
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html": [
- "6219c76898f622203fdf7fc04d40604abf7c00ba",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-https.keep-origin.http.html": [
+ "99a9367616d460012cac0b4b86545ad6a550ab64",
"testharness"
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-https/script-tag/no-redirect/generic.http.html": [
- "3a2ea609daa8894fbe11be08d2910164e887c529",
- "testharness"
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-https.keep-origin.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
+ "support"
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html": [
- "c9bd5781db9f45f53ce9c002cdf5d293f37de768",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-https.no-redirect.http.html": [
+ "23f279f394a49d22ae3da451c916942174a89865",
"testharness"
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html": [
- "28239d6b595a0643335a5b18e068c8314e30e401",
- "testharness"
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-https.no-redirect.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
+ "support"
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-https/xhr-request/no-redirect/generic.http.html": [
- "cabb0193e6dfc7c6018e66a617d07abcf7226dff",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-https.swap-origin.http.html": [
+ "a2197378de89fa319b9b54c34a7a23ebf7c552e9",
"testharness"
],
- "referrer-policy/no-referrer/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html": [
- "22147bafb08d6de30e1ca858ff0a5d2dbc8a43cb",
- "testharness"
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-https.swap-origin.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
+ "support"
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/a-tag/no-redirect/cross-origin.http.html": [
- "630393ca7b7c8d068bc663f5d02a320feb5e1f2b",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html": [
+ "cc79bca168ca3a7f666fefb229529309a90f26a8",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-origin.http.html": [
- "660496841a4b67db9d6ebab4879128461e3d0b82",
- "testharness"
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
+ "support"
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/iframe-tag/no-redirect/cross-origin.http.html": [
- "3f0455561a7cc68805855a198a064c113d7e34cd",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html": [
+ "1a877c7a62fac6644a9d99bc06c6ba0f33e0a8ff",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-origin.http.html": [
- "58a3e67dfb7d773ce133f037a987cc1194bc80b8",
- "testharness"
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
+ "support"
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/cross-origin.http.html": [
- "fe7d67eac06ea36525e7b2d7d28a3253964a1ae2",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html": [
+ "820c56c29900d9c1af3332b23423616cf9a2c85f",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/no-redirect/cross-origin.http.html": [
- "94d9aa008c80313c6e71a26715f3c932c931360e",
- "testharness"
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
+ "support"
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/cross-origin.http.html": [
- "5b7d1de44cc3a09201e37e345f71499302d6179d",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html": [
+ "64764c8002ce75f754fd271bb88a579ff65aa2e4",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/cross-origin.http.html": [
- "8b6ac65947caa0fe6b143aa42884d523f28dacff",
- "testharness"
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
+ "support"
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/script-tag/no-redirect/cross-origin.http.html": [
- "2f6692c42930b568c7862dd5535c0832d0bb2e0a",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html": [
+ "310e2242d2d89ec1f2f1591bf94c84e5ed8444d7",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/cross-origin.http.html": [
- "93e56189dfb6af99d27a33ee75ddf8bdcdfd3a80",
- "testharness"
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
+ "support"
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/a-tag/no-redirect/cross-origin.http.html": [
- "baf2fe784407fb8e1f32fefc8735b0a90ae77367",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html": [
+ "755cb361f232a681a920763ff61c88b07f0fed99",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/cross-origin.http.html": [
- "0736088aa841d21dc4a27dae62260332ed9b208c",
- "testharness"
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
+ "support"
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/iframe-tag/no-redirect/cross-origin.http.html": [
- "e6de3ee6078627f082db8f720bd4ba880215d5ae",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html": [
+ "d4d2b40461cd5d18e038224743a6333b03957fb1",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/cross-origin.http.html": [
- "eb27059a957ff35608a8adda4a3c44bf4c6e877b",
- "testharness"
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
+ "support"
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/cross-origin.http.html": [
- "eb1c0191a3bee7f8397e35181eda73fece70459b",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html": [
+ "552359471148c56f9f966402fda11f241f88c652",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/no-redirect/cross-origin.http.html": [
- "9d006903a0ecb7eb4f64fb4444e84241e5a60525",
- "testharness"
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
+ "support"
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/cross-origin.http.html": [
- "911649a5d14a91e50d73446f93ecd407fca79642",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.swap-origin.http.html": [
+ "e82ea504715fac8cf8bf470741c961f1c5e0525f",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/cross-origin.http.html": [
- "27cb0340e0f7a640871797ad23916bd752c48050",
- "testharness"
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.swap-origin.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
+ "support"
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/script-tag/no-redirect/cross-origin.http.html": [
- "08c297eae3be1e54e4a4801bdbfb12d5e7475a22",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-https.keep-origin.http.html": [
+ "c0009b6a50acb5f4c1732ebc5c3f32b2d3a4f479",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/cross-origin.http.html": [
- "3b72cc842c99c49b59fe0c0abafea1a90205120c",
- "testharness"
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-https.keep-origin.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
+ "support"
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/a-tag/no-redirect/same-origin-insecure.http.html": [
- "89532a53691ecf311dc1d91e4ec95b02f92d9932",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-https.no-redirect.http.html": [
+ "82af386aad9c2fffba6e9c1a2dbe64555cd7c83a",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/same-origin-insecure.http.html": [
- "959d00137c02d62fe2b295b9b3a24ddabcf94c6b",
- "testharness"
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-https.no-redirect.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
+ "support"
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/iframe-tag/no-redirect/same-origin-insecure.http.html": [
- "7ba2e047912035f0455dda6e854cbf40befb131f",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-https.swap-origin.http.html": [
+ "c77c8f20211f7c273d7be02e450fa60c8117234c",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html": [
- "8b215bc8f4ccea682e8f4e426c5561287ee3dd67",
- "testharness"
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-https.swap-origin.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
+ "support"
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/same-origin-insecure.http.html": [
- "4c4ea0c52d51fd6475a72bf8738511f33ba84883",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html": [
+ "47ef7569831efdbf834c999a94a1051d6cb93585",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/no-redirect/same-origin-insecure.http.html": [
- "3ae29a17caa29bc0f0721070b752ceb9948df04c",
- "testharness"
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
+ "support"
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/same-origin-insecure.http.html": [
- "e47bca42c765f858671353650023afdf9ce763fc",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html": [
+ "12f851e769bbe5122ff8b6c94fee9a483e8f2c37",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/script-tag/keep-origin-redirect/same-origin-insecure.http.html": [
- "c6421476aef9df2ee76315bcf69306a3f3e3e65f",
- "testharness"
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
+ "support"
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/script-tag/no-redirect/same-origin-insecure.http.html": [
- "77c266d21e2f8c408b265f0ca819f0bb4ca2e11a",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html": [
+ "5cfd674ea2299f38c7f446327d8d8f58017aab0e",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/script-tag/swap-origin-redirect/same-origin-insecure.http.html": [
- "511058ccf50700159c9f8c9dee4c2f5e422aab1d",
- "testharness"
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
+ "support"
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/a-tag/no-redirect/same-origin-upgrade.http.html": [
- "ffc0a2ee559cb7d488c14608a436be1a9f7447ff",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html": [
+ "04f454b3877c227c586470c76a7343cd2a78b964",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-upgrade.http.html": [
- "8ede638ebbf1cacb90e222cdd97da87aed440888",
- "testharness"
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
+ "support"
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/no-redirect/same-origin-upgrade.http.html": [
- "288fa038a4f41cd64567fb356a3cb88aa52f3f35",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html": [
+ "655c76f1c03485217fa1de2ec906c9aa38909386",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html": [
- "f8e8509b8c8494df8be4797eedf2277f624c39ae",
- "testharness"
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
+ "support"
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-upgrade.http.html": [
- "88ab886b2338d25ee790434fc25d8be68e13cbf8",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html": [
+ "0106b3154b8a8b5fc8b27c27080e7e5515dcc4c7",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/no-redirect/same-origin-upgrade.http.html": [
- "f2482c3b3aebd55a69780f16a29899df697ec6ff",
- "testharness"
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
+ "support"
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html": [
- "24ab142cfd7c61ad1dde43544e04c3ba83d1b614",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-http.keep-origin.http.html": [
+ "357cefe6efb468e92972aa7f4a6b1611b071f3a3",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-upgrade.http.html": [
- "91d8a23ea5ea8eac7ddbd8e7e17055b761ad6a3d",
- "testharness"
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-http.keep-origin.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
+ "support"
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/no-redirect/same-origin-upgrade.http.html": [
- "d486a7b8569bf5597aea470d5ec0a88507ad5f4f",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-http.no-redirect.http.html": [
+ "25a6a3c97919076db90a59b8b3e4cade6a15d87f",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html": [
- "bac54212f090b41c7e5c042137d5483eead4eace",
- "testharness"
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-http.no-redirect.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
+ "support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/a-tag/no-redirect/cross-origin.http.html": [
- "fe1ec67414d5148d1fdc4578132624ec4e79be3a",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-http.swap-origin.http.html": [
+ "617947e662cdbc6d940bb460fd807099e3be79cc",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/a-tag/no-redirect/cross-origin.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-http.swap-origin.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/cross-origin.http.html": [
- "3d02acfc5f965feb153a82fbc297dc84052b4cf2",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-https.keep-origin.http.html": [
+ "4eaee8e8e4dca8c2a8e60e4d8823e33ecc0d8a01",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/cross-origin.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-https.keep-origin.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/no-redirect/cross-origin.http.html": [
- "4fc0a20ca2a1bfa62211d62852d71881c55fa722",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-https.no-redirect.http.html": [
+ "57e98ebc9157a89b8d8fa5b19caa45b217a94ef8",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/no-redirect/cross-origin.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-https.no-redirect.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/cross-origin.http.html": [
- "46ca3525e6665b0c3c37e4d39b2ab8d9d740257b",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-https.swap-origin.http.html": [
+ "821f46b4016ef93eed711c4786181063de30efd7",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/cross-origin.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-https.swap-origin.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-origin.http.html": [
- "6367857969a0c773b63f0d9555d66a63415870ac",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html": [
+ "1ae656ab50809852f3d04cd1331fcb4e0944b06a",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-origin.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/no-redirect/cross-origin.http.html": [
- "dc266208a242be3366cd41be4236b927dbc10db5",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html": [
+ "d95dfa1fd2c8c1c54fb0100c29b7cc50e8ad66f4",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/no-redirect/cross-origin.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-origin.http.html": [
- "ae9a1a24c9619592e63a71e30e2f0a27c9e14315",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.swap-origin.http.html": [
+ "e0d685b6fc9c3e4ca08ebff64732b7950ab33aff",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-origin.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.swap-origin.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/cross-origin.http.html": [
- "3b0e4d177d76816be788e6fbe5c447987ab8a241",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-https.keep-origin.http.html": [
+ "09f77e2adaba862496c42e154f01c5273cecb47d",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/cross-origin.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-https.keep-origin.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/no-redirect/cross-origin.http.html": [
- "fd2db5728fc8048f36507acb037af177264de0b9",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-https.no-redirect.http.html": [
+ "3ed876f46d4a661e57a16f7e56b1a2e45127dfb5",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/no-redirect/cross-origin.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-https.no-redirect.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/cross-origin.http.html": [
- "b900db726c214f9e07eb4023333e3c0bc079afd3",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-https.swap-origin.http.html": [
+ "48babe4a998b6da8afe0217900c8140e25abfb54",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/cross-origin.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-https.swap-origin.http.html.headers": [
+ "a15ea7c65c8647c29e5ac992286568aa8dc013f5",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/cross-origin.http.html": [
- "62acabf41c5db52f9547df86f990a382d629d0ef",
+ "referrer-policy/gen/top.http-rp/origin/fetch/cross-http.keep-origin.http.html": [
+ "6cbfb06d497f003453c4c8926e770ff9fabc9f52",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/cross-origin.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin/fetch/cross-http.keep-origin.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/no-redirect/cross-origin.http.html": [
- "ba056619102a28b940c886ae119af906e5ddd2b0",
+ "referrer-policy/gen/top.http-rp/origin/fetch/cross-http.no-redirect.http.html": [
+ "6bd5806921b2fb10bdf077d1a39f37eb47e5c976",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/no-redirect/cross-origin.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin/fetch/cross-http.no-redirect.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/cross-origin.http.html": [
- "d86a85b208d772c930913255c55a062df6ae4038",
+ "referrer-policy/gen/top.http-rp/origin/fetch/cross-http.swap-origin.http.html": [
+ "250185ba9f48c655f204d980363fe3daa60a5200",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/cross-origin.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin/fetch/cross-http.swap-origin.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/cross-origin.http.html": [
- "a5940fd6d948771ac864b1c496108bc6a7b95856",
+ "referrer-policy/gen/top.http-rp/origin/fetch/cross-https.keep-origin.http.html": [
+ "b66c4da0baf7fc91bb120801547ad666cd59a3f9",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/cross-origin.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin/fetch/cross-https.keep-origin.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/no-redirect/cross-origin.http.html": [
- "e53a0ed387abdc55c4b6f67a3b9d3d5dd23f32af",
+ "referrer-policy/gen/top.http-rp/origin/fetch/cross-https.no-redirect.http.html": [
+ "40a04d29f8814219040a0bd35eaf5d78c6dee1f5",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/no-redirect/cross-origin.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin/fetch/cross-https.no-redirect.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/cross-origin.http.html": [
- "ebba94e987dca47e7640d1e1dfaadcd0c84b5205",
+ "referrer-policy/gen/top.http-rp/origin/fetch/cross-https.swap-origin.http.html": [
+ "eb1a8f7961942422de208ecbb7561726d756b5a7",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/cross-origin.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin/fetch/cross-https.swap-origin.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/a-tag/no-redirect/cross-origin.http.html": [
- "d36ac614868ed5876dfd83d7d7f1baded7be7593",
+ "referrer-policy/gen/top.http-rp/origin/fetch/same-http.keep-origin.http.html": [
+ "e3569f1d503608a3960ba14b5b73774b06fc8304",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/a-tag/no-redirect/cross-origin.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin/fetch/same-http.keep-origin.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/cross-origin.http.html": [
- "8ddd158183954939e926761a72a6cdbf14de5602",
+ "referrer-policy/gen/top.http-rp/origin/fetch/same-http.no-redirect.http.html": [
+ "1d138fae4c42f9d7163ece7ce65d00dfa8fbc053",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/cross-origin.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin/fetch/same-http.no-redirect.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/no-redirect/cross-origin.http.html": [
- "3740814c4419d8b219acce92103bb2bac262db00",
+ "referrer-policy/gen/top.http-rp/origin/fetch/same-http.swap-origin.http.html": [
+ "092fec8239c119c983a504e44dda34592ce459c8",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/no-redirect/cross-origin.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin/fetch/same-http.swap-origin.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/cross-origin.http.html": [
- "461c255ec906b0acc01acdf11fc1655228512193",
+ "referrer-policy/gen/top.http-rp/origin/fetch/same-https.keep-origin.http.html": [
+ "7202a43af1e6ca02e62b041b6a8bbc1b8e5f0c60",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/cross-origin.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin/fetch/same-https.keep-origin.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/cross-origin.http.html": [
- "f8cecd0d79184464fe81c88b604815601477ea94",
+ "referrer-policy/gen/top.http-rp/origin/fetch/same-https.no-redirect.http.html": [
+ "199f948f395ef2b0f4b4c97058a7e72acaf6b02a",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/cross-origin.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin/fetch/same-https.no-redirect.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/no-redirect/cross-origin.http.html": [
- "e1b46f72b9db5b9af8a42b45084c18d14e68a3ec",
+ "referrer-policy/gen/top.http-rp/origin/fetch/same-https.swap-origin.http.html": [
+ "e254d58d35f3f84e0d22e2df1a8a868fce81d8e8",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/no-redirect/cross-origin.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin/fetch/same-https.swap-origin.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/cross-origin.http.html": [
- "010656cfb05464a5cf92b6e81e3aab8da37ca910",
+ "referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-http.keep-origin.http.html": [
+ "0044911c2d896d6c074f4248184edbdcc5c20b5c",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/cross-origin.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-http.keep-origin.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/cross-origin.http.html": [
- "0feafdce56ef60e3ed92f78379b6a20d81de29a1",
+ "referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-http.no-redirect.http.html": [
+ "fd06406bc98bfc54a1e1aebf0962817d45e7b800",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/cross-origin.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-http.no-redirect.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/no-redirect/cross-origin.http.html": [
- "a72089286fb826bf64b2622527dd299c251577d8",
+ "referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-http.swap-origin.http.html": [
+ "e3ac6f648e3e8c2d5fd373405607563711a8c978",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/no-redirect/cross-origin.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-http.swap-origin.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/cross-origin.http.html": [
- "db33032990969b2ca2c98ab946ebc8294b75fde1",
+ "referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-https.keep-origin.http.html": [
+ "78b5cfa3bb9fd7e1a266ded3a92d9565ab960be4",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/cross-origin.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-https.keep-origin.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/cross-origin.http.html": [
- "47e98f19d009e7d71ea1bb2b5e14c845d20716f8",
+ "referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-https.no-redirect.http.html": [
+ "86cf62f479d2811cc469e328d0c38ba2d5cd3e59",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/cross-origin.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-https.no-redirect.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/no-redirect/cross-origin.http.html": [
- "ddf8b522b59c69eb555051dacb2ab247634ea273",
+ "referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-https.swap-origin.http.html": [
+ "58ff33f802400a81f234a7af9af9306b932f7996",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/no-redirect/cross-origin.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-https.swap-origin.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/cross-origin.http.html": [
- "17f72f727026c968018ee8b5f0dfb788ef67a910",
+ "referrer-policy/gen/top.http-rp/origin/iframe-tag/same-http.keep-origin.http.html": [
+ "51910edd9d3d4281c3888843fa6d11dbe5f22506",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/cross-origin.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin/iframe-tag/same-http.keep-origin.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/cross-origin.http.html": [
- "4dbd0d1e8c51f8094d85b289d499d734e76743f3",
+ "referrer-policy/gen/top.http-rp/origin/iframe-tag/same-http.no-redirect.http.html": [
+ "3432542251d92d9ed58831064f97c454ca628e26",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/cross-origin.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin/iframe-tag/same-http.no-redirect.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/no-redirect/cross-origin.http.html": [
- "01b339b41d22f5bc6a951aa5fd8aff63b4255000",
+ "referrer-policy/gen/top.http-rp/origin/iframe-tag/same-http.swap-origin.http.html": [
+ "f0827d96efbe8f8439de317e1acb98a0a672517b",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/no-redirect/cross-origin.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin/iframe-tag/same-http.swap-origin.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/cross-origin.http.html": [
- "07a972315fc2b7a78fdd005996aa667fb5fc0b10",
+ "referrer-policy/gen/top.http-rp/origin/iframe-tag/same-https.keep-origin.http.html": [
+ "a9fc93d6b541824468462db3e7fff03e1c97972a",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/cross-origin.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin/iframe-tag/same-https.keep-origin.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/a-tag/no-redirect/same-origin-insecure.http.html": [
- "f4db0be0e50a3e66d7eadb2b1eaeff2fa1072509",
+ "referrer-policy/gen/top.http-rp/origin/iframe-tag/same-https.no-redirect.http.html": [
+ "eaf0c719cdf57d48270861538cef2509bfbc140e",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/a-tag/no-redirect/same-origin-insecure.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin/iframe-tag/same-https.no-redirect.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/same-origin-insecure.http.html": [
- "befe72d96952d108419428bccef26144744e38ed",
+ "referrer-policy/gen/top.http-rp/origin/iframe-tag/same-https.swap-origin.http.html": [
+ "72264666b1326ca93485d618e009a19a0ba11241",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/same-origin-insecure.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin/iframe-tag/same-https.swap-origin.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/no-redirect/same-origin-insecure.http.html": [
- "b2eca76078f98d48815263a0fa1ac8002cf8d7ea",
+ "referrer-policy/gen/top.http-rp/origin/img-tag/cross-http.keep-origin.http.html": [
+ "16ea22743cbf29ff6bfef58878a11f6ebe6abe32",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/no-redirect/same-origin-insecure.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin/img-tag/cross-http.keep-origin.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/same-origin-insecure.http.html": [
- "50768c30cf4808e62feca3447ff7fff25ce26d9a",
+ "referrer-policy/gen/top.http-rp/origin/img-tag/cross-http.no-redirect.http.html": [
+ "eb9dcf7831813b6bbb06103635f7660e67642d3d",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/same-origin-insecure.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin/img-tag/cross-http.no-redirect.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/same-origin-insecure.http.html": [
- "8fae2caef61c064bbe211e5c7bf25e4ac7f5bf32",
+ "referrer-policy/gen/top.http-rp/origin/img-tag/cross-http.swap-origin.http.html": [
+ "1872a9310f73cc13ea157b5ff3d4b2a9d713863a",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/same-origin-insecure.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin/img-tag/cross-http.swap-origin.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/no-redirect/same-origin-insecure.http.html": [
- "4a41087b0957293569d7b5b9b22333a762b1c112",
+ "referrer-policy/gen/top.http-rp/origin/img-tag/cross-https.keep-origin.http.html": [
+ "7cb2e58c22f99008aada61b3f77e8efaad2b9af0",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/no-redirect/same-origin-insecure.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin/img-tag/cross-https.keep-origin.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html": [
- "b6a898c1ad2ba01d8d65ce22c70cc98792d716c8",
+ "referrer-policy/gen/top.http-rp/origin/img-tag/cross-https.no-redirect.http.html": [
+ "5993c1a4dc4239cdac7d531a3aef0ac0ed78a511",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin/img-tag/cross-https.no-redirect.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/same-origin-insecure.http.html": [
- "a26f0dd202efa7f762250a60aade5a834c4fff0b",
+ "referrer-policy/gen/top.http-rp/origin/img-tag/cross-https.swap-origin.http.html": [
+ "2a00f3c6fdc736b1e3cba76310beedd091879a12",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/same-origin-insecure.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin/img-tag/cross-https.swap-origin.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/no-redirect/same-origin-insecure.http.html": [
- "8b178d9990ce8e354d481ce53a0f259b58495655",
+ "referrer-policy/gen/top.http-rp/origin/img-tag/same-http.keep-origin.http.html": [
+ "f41dd8ed255f7ca0b2c8946ff8a7c2616a707f81",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/no-redirect/same-origin-insecure.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin/img-tag/same-http.keep-origin.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/same-origin-insecure.http.html": [
- "0a46c97106b3bea9148faeb0cfa22a53b287519d",
+ "referrer-policy/gen/top.http-rp/origin/img-tag/same-http.no-redirect.http.html": [
+ "23f60063607862cf423b08a109788cdc941b9d0f",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/same-origin-insecure.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin/img-tag/same-http.no-redirect.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/same-origin-insecure.http.html": [
- "cc92566b86d5c51a99cdb88d2b2befe7b942391f",
+ "referrer-policy/gen/top.http-rp/origin/img-tag/same-http.swap-origin.http.html": [
+ "17e0f0409963b0cb59a6bee9c3da8a41423d25c1",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/same-origin-insecure.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin/img-tag/same-http.swap-origin.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/module-worker/no-redirect/same-origin-insecure.http.html": [
- "9992788652176c505f9d33ccfd9df07dedeb8b2e",
+ "referrer-policy/gen/top.http-rp/origin/img-tag/same-https.keep-origin.http.html": [
+ "3c0453f8617984dcb2dcce32ed123966ba1f7011",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/module-worker/no-redirect/same-origin-insecure.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin/img-tag/same-https.keep-origin.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/same-origin-insecure.http.html": [
- "a7d6c72f08caa74b81527baf1c6b359ff39674f0",
+ "referrer-policy/gen/top.http-rp/origin/img-tag/same-https.no-redirect.http.html": [
+ "9d0609167f105fa84ab44f63358eb51de567e1e0",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/same-origin-insecure.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin/img-tag/same-https.no-redirect.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/no-redirect/same-origin-insecure.http.html": [
- "c4df370a7176dc44b2a7df8368ffac6a37554ce1",
+ "referrer-policy/gen/top.http-rp/origin/img-tag/same-https.swap-origin.http.html": [
+ "6c00fd9985fde883af3b30e7e50ad5240ac7a7ba",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/no-redirect/same-origin-insecure.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin/img-tag/same-https.swap-origin.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/same-origin-insecure.http.html": [
- "8c45a5dac2060916108e47d34681482e482b60bc",
+ "referrer-policy/gen/top.http-rp/origin/script-tag/cross-http.keep-origin.http.html": [
+ "5bee1774b3f3c80b27f45eb07629c2fbddb5cfdf",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/same-origin-insecure.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin/script-tag/cross-http.keep-origin.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/same-origin-insecure.http.html": [
- "bd13da2a29235068d2a7c78762e9d951876f82e5",
+ "referrer-policy/gen/top.http-rp/origin/script-tag/cross-http.no-redirect.http.html": [
+ "580b42e0c9962bcd8202e7b78d9811b94e9d467d",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/same-origin-insecure.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin/script-tag/cross-http.no-redirect.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/shared-worker/no-redirect/same-origin-insecure.http.html": [
- "3c53fa01167f51f8d848eeb95f236c6fef48b190",
+ "referrer-policy/gen/top.http-rp/origin/script-tag/cross-http.swap-origin.http.html": [
+ "413b20aa2bd183f5d106d87cac71e36fa53b5f1e",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/shared-worker/no-redirect/same-origin-insecure.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin/script-tag/cross-http.swap-origin.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/same-origin-insecure.http.html": [
- "ec3e284c3c517e5ac679d5539280f36730a1a197",
+ "referrer-policy/gen/top.http-rp/origin/script-tag/cross-https.keep-origin.http.html": [
+ "29f367a04e85860006a6f6ae8f7fc32715284a60",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/same-origin-insecure.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin/script-tag/cross-https.keep-origin.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/worker-request/no-redirect/same-origin-insecure.http.html": [
- "e6854db2f3d460c70803dff7cdf8b2fc314e0e59",
+ "referrer-policy/gen/top.http-rp/origin/script-tag/cross-https.no-redirect.http.html": [
+ "d2c5bfc2bfcf2c365e6c53cffaa2d7acc3c7a6de",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/worker-request/no-redirect/same-origin-insecure.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin/script-tag/cross-https.no-redirect.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/same-origin-insecure.http.html": [
- "526c2648432649ddeeb9243c95075f21d65432a7",
+ "referrer-policy/gen/top.http-rp/origin/script-tag/cross-https.swap-origin.http.html": [
+ "63670d985975364bc8bb2737244f408f54b87549",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/same-origin-insecure.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin/script-tag/cross-https.swap-origin.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/no-redirect/same-origin-insecure.http.html": [
- "bbf21e785f331cbc60fc74d90b297f9cce2b2bab",
+ "referrer-policy/gen/top.http-rp/origin/script-tag/same-http.keep-origin.http.html": [
+ "1b150f1cf653b82a7b02a25f2290d9e48513f709",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/no-redirect/same-origin-insecure.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin/script-tag/same-http.keep-origin.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/same-origin-insecure.http.html": [
- "9cef48221ac71c385e94da70662eb003a1ade758",
+ "referrer-policy/gen/top.http-rp/origin/script-tag/same-http.no-redirect.http.html": [
+ "3b8b1ced9008cc7bb279e08b6c6f0b0246ffac44",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/same-origin-insecure.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin/script-tag/same-http.no-redirect.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/a-tag/no-redirect/same-origin-upgrade.http.html": [
- "e9125ad06822298506b35dda16d51f1273c3d03f",
+ "referrer-policy/gen/top.http-rp/origin/script-tag/same-http.swap-origin.http.html": [
+ "bfdb519d4b4a07b6bdb5ae6e6b180ace3e4e09b4",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/a-tag/no-redirect/same-origin-upgrade.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin/script-tag/same-http.swap-origin.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-upgrade.http.html": [
- "4b59071d48b6106bea107ff835c621979b9b174a",
+ "referrer-policy/gen/top.http-rp/origin/script-tag/same-https.keep-origin.http.html": [
+ "eec55f1a686a9389721e861b93c0fee5734fce99",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-upgrade.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin/script-tag/same-https.keep-origin.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/same-origin-upgrade.http.html": [
- "0a8ce7cfe019b0a69c6579718a093714d7da2d36",
+ "referrer-policy/gen/top.http-rp/origin/script-tag/same-https.no-redirect.http.html": [
+ "028ccc9d419e84845953d4d39a5bea7b289e49f4",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/same-origin-upgrade.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin/script-tag/same-https.no-redirect.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-insecure.http.html": [
- "09f21bf5294019cf3c28527510a8ece967342884",
+ "referrer-policy/gen/top.http-rp/origin/script-tag/same-https.swap-origin.http.html": [
+ "7c9efe9c54023d8378fb1820008cd5d1a2d77415",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-insecure.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin/script-tag/same-https.swap-origin.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-upgrade.http.html": [
- "53229010cfde7ae29820198175f51b16f7cf256d",
+ "referrer-policy/gen/top.http-rp/origin/sharedworker-classic/same-http.keep-origin.http.html": [
+ "0e8b46c950402fd1e90c053cd7b6e5a4606e0ed0",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-upgrade.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin/sharedworker-classic/same-http.keep-origin.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/same-origin-upgrade.http.html": [
- "6a53bb812b332c38ed91bb8264c7d7ca31dc5bff",
+ "referrer-policy/gen/top.http-rp/origin/sharedworker-classic/same-http.no-redirect.http.html": [
+ "13249150441cd2833076b10a5f8ac9870d388e40",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/same-origin-upgrade.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin/sharedworker-classic/same-http.no-redirect.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html": [
- "dd27004c1c42d367f53a6dafba279783ee1f501e",
+ "referrer-policy/gen/top.http-rp/origin/worker-classic/same-http.keep-origin.http.html": [
+ "516598a940825c04fb873d1a60b57d4569c36c27",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin/worker-classic/same-http.keep-origin.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-upgrade.http.html": [
- "131c0e0893acb016b8e75d3fe7c490155b025466",
+ "referrer-policy/gen/top.http-rp/origin/worker-classic/same-http.no-redirect.http.html": [
+ "d2b60caa30da56690e93f9ceb8b08ac07b288d02",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-upgrade.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin/worker-classic/same-http.no-redirect.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/no-redirect/same-origin-upgrade.http.html": [
- "61753d6188a4d09c602317a0bc85904fdd300b10",
+ "referrer-policy/gen/top.http-rp/origin/worker-module/same-http.keep-origin.http.html": [
+ "7c4685d0160385c71a6fa3c35553231be43f634c",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/no-redirect/same-origin-upgrade.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin/worker-module/same-http.keep-origin.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html": [
- "e3cd061000348e114d4d99604588ceba4688a7f6",
+ "referrer-policy/gen/top.http-rp/origin/worker-module/same-http.no-redirect.http.html": [
+ "6d60f9473ab9ef5a57b29245470111c3c5825cef",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin/worker-module/same-http.no-redirect.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-upgrade.http.html": [
- "6c8a0fd643d07b393a2006b91d6ad07cc8f7eeda",
+ "referrer-policy/gen/top.http-rp/origin/xhr/cross-http.keep-origin.http.html": [
+ "d1cf15a5745deb5dbecd3f81a8847f69c61dada8",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-upgrade.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin/xhr/cross-http.keep-origin.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/no-redirect/same-origin-upgrade.http.html": [
- "5c6d59f53ec20186ecfd41f7a201254a7a25c956",
+ "referrer-policy/gen/top.http-rp/origin/xhr/cross-http.no-redirect.http.html": [
+ "fe4f588ad949fe8e4a2ac8d40f84cb2dce86d68c",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/no-redirect/same-origin-upgrade.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin/xhr/cross-http.no-redirect.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html": [
- "4ccf6b24c826e16fd777a7be85daab905e167c59",
+ "referrer-policy/gen/top.http-rp/origin/xhr/cross-http.swap-origin.http.html": [
+ "4106f858486b8ef01372356a5facb641c72d77c3",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin/xhr/cross-http.swap-origin.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-upgrade.http.html": [
- "07887aa6a61e8cd3d3dde5eed460706747b56515",
+ "referrer-policy/gen/top.http-rp/origin/xhr/cross-https.keep-origin.http.html": [
+ "09fb97ad9522eff4cdc3e9dd414e3aaff41fca97",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-upgrade.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin/xhr/cross-https.keep-origin.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/same-origin-upgrade.http.html": [
- "a226cfc9422b2c890dbfbf45fac61a77bb71365b",
+ "referrer-policy/gen/top.http-rp/origin/xhr/cross-https.no-redirect.http.html": [
+ "5f6c2bdb9e0389113a7a482695bbc988930552f9",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/same-origin-upgrade.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin/xhr/cross-https.no-redirect.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-insecure.http.html": [
- "9d2cb261d6ed481802a79c763a93d2afc76c9712",
+ "referrer-policy/gen/top.http-rp/origin/xhr/cross-https.swap-origin.http.html": [
+ "cb8df81462aa50ad68313124e4ba08197ad82736",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-insecure.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
+ "referrer-policy/gen/top.http-rp/origin/xhr/cross-https.swap-origin.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
"support"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/a-tag/no-redirect/cross-origin.http.html": [
- "7d128a216ef75637832ff7a396834471efc5c417",
+ "referrer-policy/gen/top.http-rp/origin/xhr/same-http.keep-origin.http.html": [
+ "8aca08162ba29a5a7d31a06eddc9c5671e204c7d",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/fetch-request/keep-origin-redirect/cross-origin.http.html": [
- "f95a61709ba79dd1cc02cab834ac3092edd9dd6f",
- "testharness"
+ "referrer-policy/gen/top.http-rp/origin/xhr/same-http.keep-origin.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
+ "support"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/fetch-request/no-redirect/cross-origin.http.html": [
- "e5c4a5b9d708b5decf2d34476e72881c005da9ef",
+ "referrer-policy/gen/top.http-rp/origin/xhr/same-http.no-redirect.http.html": [
+ "c6d243af5548bb36602af9d8d92366dbfc4139a9",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/fetch-request/swap-origin-redirect/cross-origin.http.html": [
- "6b69d4f3399ad85f1a31c390e85b9f2300e3de89",
- "testharness"
+ "referrer-policy/gen/top.http-rp/origin/xhr/same-http.no-redirect.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
+ "support"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-origin.http.html": [
- "b36d8e43696277d3b94a225c0e68c4cd71dbbb8a",
+ "referrer-policy/gen/top.http-rp/origin/xhr/same-http.swap-origin.http.html": [
+ "2f672f8f5363d21cbda18c09364ce75d9dab04ba",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/iframe-tag/no-redirect/cross-origin.http.html": [
- "cb22d1880e1df36b66793c9609619218891bd98e",
- "testharness"
+ "referrer-policy/gen/top.http-rp/origin/xhr/same-http.swap-origin.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
+ "support"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-origin.http.html": [
- "10c4f95342800956f51ce42a808cc88460b738e7",
+ "referrer-policy/gen/top.http-rp/origin/xhr/same-https.keep-origin.http.html": [
+ "dfa0026566a6551266e327f9e81da4227079e6ca",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/cross-origin.http.html": [
- "f93f8399ef7a63d1bf2bccac4c1c425381ffb94f",
- "testharness"
+ "referrer-policy/gen/top.http-rp/origin/xhr/same-https.keep-origin.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
+ "support"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/no-redirect/cross-origin.http.html": [
- "ef7dfd49fe4b8a0ed379cc1b8818d482c8d81b1a",
+ "referrer-policy/gen/top.http-rp/origin/xhr/same-https.no-redirect.http.html": [
+ "9802aebc81266018e6c74590f922135449dd7997",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/cross-origin.http.html": [
- "6335b58a250d6dd753fdff0d1d726914a2053deb",
- "testharness"
+ "referrer-policy/gen/top.http-rp/origin/xhr/same-https.no-redirect.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
+ "support"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/cross-origin.http.html": [
- "9087f457aa760306ec583d5d568300702f09e172",
+ "referrer-policy/gen/top.http-rp/origin/xhr/same-https.swap-origin.http.html": [
+ "823d510fb7374687fefe85c116fa42c1757c3f08",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/script-tag/no-redirect/cross-origin.http.html": [
- "cfbb2478acdd5678c931dcbc45b6359264838696",
- "testharness"
+ "referrer-policy/gen/top.http-rp/origin/xhr/same-https.swap-origin.http.html.headers": [
+ "ecff74b90dc209912b003388bcac7ca584b12762",
+ "support"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/cross-origin.http.html": [
- "562bc513b1b6f802f25a8e73da60965bec0043d3",
+ "referrer-policy/gen/top.http-rp/same-origin/fetch/cross-http.keep-origin.http.html": [
+ "b0c2bb827833a0b7063db45c84379394201abcc6",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/xhr-request/keep-origin-redirect/cross-origin.http.html": [
- "2aa2cdd9b4cd11bf00787f6ac781359e467ce365",
- "testharness"
+ "referrer-policy/gen/top.http-rp/same-origin/fetch/cross-http.keep-origin.http.html.headers": [
+ "be66cf9321103b1397670f3acc89cecc09aabec2",
+ "support"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/xhr-request/no-redirect/cross-origin.http.html": [
- "92b2a2069cfa6916881dcf35d434da9a6b0e4c70",
+ "referrer-policy/gen/top.http-rp/same-origin/fetch/cross-http.no-redirect.http.html": [
+ "4b04c2b5f22b33bf620f791b0b448ca7fa5ef4f0",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/xhr-request/swap-origin-redirect/cross-origin.http.html": [
- "9703cae9306952a4139e94e8975725fd136e8b42",
- "testharness"
+ "referrer-policy/gen/top.http-rp/same-origin/fetch/cross-http.no-redirect.http.html.headers": [
+ "be66cf9321103b1397670f3acc89cecc09aabec2",
+ "support"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/a-tag/no-redirect/cross-origin.http.html": [
- "bfae1b4ce35cd823606a7f5fc14fc0112a53b8b7",
+ "referrer-policy/gen/top.http-rp/same-origin/fetch/cross-http.swap-origin.http.html": [
+ "53818e453281a1369c9277ea98a2c304de196709",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/fetch-request/keep-origin-redirect/cross-origin.http.html": [
- "8f5342fc17a5766ddb7b91d012b4f50a5461be97",
- "testharness"
+ "referrer-policy/gen/top.http-rp/same-origin/fetch/cross-http.swap-origin.http.html.headers": [
+ "be66cf9321103b1397670f3acc89cecc09aabec2",
+ "support"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/fetch-request/no-redirect/cross-origin.http.html": [
- "c4f1a54f2c66550b87da3b40f5c8f7d791c93c54",
+ "referrer-policy/gen/top.http-rp/same-origin/fetch/cross-https.keep-origin.http.html": [
+ "50eedd46d534dad4c9e19152a9e22196c9b887dc",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/fetch-request/swap-origin-redirect/cross-origin.http.html": [
- "1b961e3dfb4979d4a5d6f9f4e03a9740f9c5062c",
- "testharness"
+ "referrer-policy/gen/top.http-rp/same-origin/fetch/cross-https.keep-origin.http.html.headers": [
+ "be66cf9321103b1397670f3acc89cecc09aabec2",
+ "support"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/cross-origin.http.html": [
- "137aa7e3af898e5f6d84cea5ad871ebe5409f3ab",
+ "referrer-policy/gen/top.http-rp/same-origin/fetch/cross-https.no-redirect.http.html": [
+ "594d1e2370921250d44fc0a997175afa721898f8",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/iframe-tag/no-redirect/cross-origin.http.html": [
- "1703a958e784b6839a74a274b8f8352c822a095d",
- "testharness"
+ "referrer-policy/gen/top.http-rp/same-origin/fetch/cross-https.no-redirect.http.html.headers": [
+ "be66cf9321103b1397670f3acc89cecc09aabec2",
+ "support"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/cross-origin.http.html": [
- "c3c98c4d4409583cc8de4acc1b64b9f82ead18c4",
+ "referrer-policy/gen/top.http-rp/same-origin/fetch/cross-https.swap-origin.http.html": [
+ "b52735fed340ee526bb39ac9aba470705f197371",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/cross-origin.http.html": [
- "3d8e32017d195ab4252b2507943a4fa8cc006b09",
- "testharness"
+ "referrer-policy/gen/top.http-rp/same-origin/fetch/cross-https.swap-origin.http.html.headers": [
+ "be66cf9321103b1397670f3acc89cecc09aabec2",
+ "support"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/img-tag/no-redirect/cross-origin.http.html": [
- "9fa4ca3c127760d4889756e89839e65ae0a66d34",
+ "referrer-policy/gen/top.http-rp/same-origin/fetch/same-http.keep-origin.http.html": [
+ "88168ccbf8c4f7e2b588a7d44ffe2ac5c8b7f5dc",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/cross-origin.http.html": [
- "feec6a71fff2d37100ce6a907cd9ad38cfa5cb12",
- "testharness"
+ "referrer-policy/gen/top.http-rp/same-origin/fetch/same-http.keep-origin.http.html.headers": [
+ "be66cf9321103b1397670f3acc89cecc09aabec2",
+ "support"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/cross-origin.http.html": [
- "c1c349086bc4b26c482ff27705c1c17090ccb88a",
+ "referrer-policy/gen/top.http-rp/same-origin/fetch/same-http.no-redirect.http.html": [
+ "5c6b99310ee14cfbdf2fd47cc096e1bc7482a5c8",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/script-tag/no-redirect/cross-origin.http.html": [
- "a796ddbddc449d2e8b480598303458110fb1456d",
- "testharness"
+ "referrer-policy/gen/top.http-rp/same-origin/fetch/same-http.no-redirect.http.html.headers": [
+ "be66cf9321103b1397670f3acc89cecc09aabec2",
+ "support"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/cross-origin.http.html": [
- "cd2d7972f0d9a9cb7c62086b517a3f287effaf4a",
+ "referrer-policy/gen/top.http-rp/same-origin/fetch/same-http.swap-origin.http.html": [
+ "dc653329cf19e0b06685a5bdb992e0b85a6bbb8e",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/xhr-request/keep-origin-redirect/cross-origin.http.html": [
- "592768a121ef135ad5e6f533bbd50d961311ede6",
- "testharness"
+ "referrer-policy/gen/top.http-rp/same-origin/fetch/same-http.swap-origin.http.html.headers": [
+ "be66cf9321103b1397670f3acc89cecc09aabec2",
+ "support"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/xhr-request/no-redirect/cross-origin.http.html": [
- "7824367f87b613e9deafd127f6f41b830b68a029",
+ "referrer-policy/gen/top.http-rp/same-origin/fetch/same-https.swap-origin.http.html": [
+ "d7cf4f1fffd4a45684e1f3a2c7e1b5587a1edce7",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/xhr-request/swap-origin-redirect/cross-origin.http.html": [
- "7f07485e08e69aaf2ef8ad584182c1431f0b1e5d",
- "testharness"
+ "referrer-policy/gen/top.http-rp/same-origin/fetch/same-https.swap-origin.http.html.headers": [
+ "be66cf9321103b1397670f3acc89cecc09aabec2",
+ "support"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/a-tag/no-redirect/same-origin-insecure.http.html": [
- "c9d64acd3ff519673914c0a921d1d4c6730d4ab4",
+ "referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-http.keep-origin.http.html": [
+ "3efc9cd5a379be758e3d9a16b09ca8d78ba529f0",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/fetch-request/keep-origin-redirect/same-origin-insecure.http.html": [
- "8d8aa7b1407caba05ace8055ccabf0e59f830d8c",
- "testharness"
+ "referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-http.keep-origin.http.html.headers": [
+ "be66cf9321103b1397670f3acc89cecc09aabec2",
+ "support"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/fetch-request/no-redirect/same-origin-insecure.http.html": [
- "585c54a5b78d7cacc85dbf2dfda0f22b2847d463",
+ "referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-http.no-redirect.http.html": [
+ "16e6f6c59ffca07f212d42ebc853a5b51fa700e4",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/fetch-request/swap-origin-redirect/same-origin-insecure.http.html": [
- "53e908467c899a2ec44bcd649503d44aabe27e35",
- "testharness"
+ "referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-http.no-redirect.http.html.headers": [
+ "be66cf9321103b1397670f3acc89cecc09aabec2",
+ "support"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/same-origin-insecure.http.html": [
- "48e6c69b5557c4d0a2dc359f9562c81bc2d98c2a",
+ "referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-http.swap-origin.http.html": [
+ "03bc1011caf9bee509b53c534035d5897ab87cad",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/iframe-tag/no-redirect/same-origin-insecure.http.html": [
- "aa3dda32d62afe6a5997b80d5bf3b76dd920272c",
- "testharness"
+ "referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-http.swap-origin.http.html.headers": [
+ "be66cf9321103b1397670f3acc89cecc09aabec2",
+ "support"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html": [
- "d319c671e1fff162309345b0c32066dd1c4cfb01",
+ "referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-https.keep-origin.http.html": [
+ "29d622ea25ed03c52f6f09fce19f3ce9123b41bb",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/img-tag/keep-origin-redirect/same-origin-insecure.http.html": [
- "2986e09860fd2ee0b6847efbf483c4ebc2a3b2fb",
- "testharness"
+ "referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-https.keep-origin.http.html.headers": [
+ "be66cf9321103b1397670f3acc89cecc09aabec2",
+ "support"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/img-tag/no-redirect/same-origin-insecure.http.html": [
- "b44acdd3f3bd62b513b1d41267e2810476ec65db",
+ "referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-https.no-redirect.http.html": [
+ "e4322a6a1c740e20eca230640f9a1c119c29794c",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/img-tag/swap-origin-redirect/same-origin-insecure.http.html": [
- "da358ee0e1c90cda547d6e25bf2c4858db18ef29",
- "testharness"
+ "referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-https.no-redirect.http.html.headers": [
+ "be66cf9321103b1397670f3acc89cecc09aabec2",
+ "support"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/module-worker/keep-origin-redirect/same-origin-insecure.http.html": [
- "2127ef3ada6999f1e1c1ff5964b1ea661d13debc",
+ "referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-https.swap-origin.http.html": [
+ "9ed0d18972a7f3aa313f018576c8ec7b7a4d1d8e",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/module-worker/no-redirect/same-origin-insecure.http.html": [
- "cfb23ead04437265b61cb4531c929991ee3bb18d",
- "testharness"
+ "referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-https.swap-origin.http.html.headers": [
+ "be66cf9321103b1397670f3acc89cecc09aabec2",
+ "support"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/script-tag/keep-origin-redirect/same-origin-insecure.http.html": [
- "57db10fef105cd14ec0f6c74204533c328c0c6c7",
+ "referrer-policy/gen/top.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html": [
+ "5692389863e8b2d4904343daf2e7bf2430d65d13",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/script-tag/no-redirect/same-origin-insecure.http.html": [
- "e854d09454f1061c079a867cdf0080d0f3b310c5",
- "testharness"
+ "referrer-policy/gen/top.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html.headers": [
+ "be66cf9321103b1397670f3acc89cecc09aabec2",
+ "support"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/script-tag/swap-origin-redirect/same-origin-insecure.http.html": [
- "58993fbddb9315fcbae4d9fece540842cfb13a41",
+ "referrer-policy/gen/top.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html": [
+ "45819d53de3f8268b13da319129a02999f777649",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/shared-worker/keep-origin-redirect/same-origin-insecure.http.html": [
- "58588cbd89f1704af989f296d4db656b89d59ed8",
- "testharness"
+ "referrer-policy/gen/top.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html.headers": [
+ "be66cf9321103b1397670f3acc89cecc09aabec2",
+ "support"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/shared-worker/no-redirect/same-origin-insecure.http.html": [
- "57abce25ec01003afeb22eba5ede3f4a032d638f",
+ "referrer-policy/gen/top.http-rp/same-origin/iframe-tag/same-http.swap-origin.http.html": [
+ "38fc13c75046b6a0cdf08851424df30c8679c5fb",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/worker-request/keep-origin-redirect/same-origin-insecure.http.html": [
- "73a9963f1f09c29be39e2c87f0a96dd048345d85",
- "testharness"
+ "referrer-policy/gen/top.http-rp/same-origin/iframe-tag/same-http.swap-origin.http.html.headers": [
+ "be66cf9321103b1397670f3acc89cecc09aabec2",
+ "support"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/worker-request/no-redirect/same-origin-insecure.http.html": [
- "e5d89fb2d20b92c6fd79920fad9db36a3425361b",
+ "referrer-policy/gen/top.http-rp/same-origin/iframe-tag/same-https.swap-origin.http.html": [
+ "604a68f372c5e01ac84f03c1a1c9fc8a2db727eb",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/xhr-request/keep-origin-redirect/same-origin-insecure.http.html": [
- "f69d366a327ce38af4e4f6bf5f6050228e1495d4",
- "testharness"
+ "referrer-policy/gen/top.http-rp/same-origin/iframe-tag/same-https.swap-origin.http.html.headers": [
+ "be66cf9321103b1397670f3acc89cecc09aabec2",
+ "support"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/xhr-request/no-redirect/same-origin-insecure.http.html": [
- "ee0f051f770363169c67cc362fb06f0f12975384",
+ "referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-http.keep-origin.http.html": [
+ "8c9e523158482fb9ef838d725393211a70f9447f",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/xhr-request/swap-origin-redirect/same-origin-insecure.http.html": [
- "ec455a6aef7bb4ec4f970dd477a3abce74ba7728",
- "testharness"
+ "referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-http.keep-origin.http.html.headers": [
+ "be66cf9321103b1397670f3acc89cecc09aabec2",
+ "support"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/a-tag/no-redirect/same-origin-upgrade.http.html": [
- "a709e40c51bed38738d5fe4546688fd20095464d",
+ "referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-http.no-redirect.http.html": [
+ "47c03577e3851a382ec5fbb482783ecc2f39d1b9",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-upgrade.http.html": [
- "dc2c9d9ab75d5f7ea01e0fdcecf02fe257e76ac6",
- "testharness"
+ "referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-http.no-redirect.http.html.headers": [
+ "be66cf9321103b1397670f3acc89cecc09aabec2",
+ "support"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/no-redirect/same-origin-upgrade.http.html": [
- "9fbc08e5384510b7587629e3afe6e061d1a7e485",
+ "referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-http.swap-origin.http.html": [
+ "84548e254493a75aaa7baadd33d87e9fe9febb6a",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-insecure.http.html": [
- "3f46fabe37b2e5c7f79a95f5f522c5c7f1e0373b",
- "testharness"
+ "referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-http.swap-origin.http.html.headers": [
+ "be66cf9321103b1397670f3acc89cecc09aabec2",
+ "support"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-upgrade.http.html": [
- "3ca5a0b0d7cfd6570b759509eeed04f66f306941",
+ "referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-https.keep-origin.http.html": [
+ "73b4b43fe3e02be250004f81363ee79b065d41c4",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/same-origin-upgrade.http.html": [
- "a17b3ba8c1737d21cd340e91425d2cb8f8cf4ff5",
- "testharness"
+ "referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-https.keep-origin.http.html.headers": [
+ "be66cf9321103b1397670f3acc89cecc09aabec2",
+ "support"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html": [
- "fda77dbd15b820e70807c6ba4c50416b3a3241d9",
+ "referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-https.no-redirect.http.html": [
+ "dbba3b8e30827ec5f5b6049ee01a78d507dc083f",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-upgrade.http.html": [
- "140fbb9684b9834702b642c8ccc0f050e68372e6",
- "testharness"
+ "referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-https.no-redirect.http.html.headers": [
+ "be66cf9321103b1397670f3acc89cecc09aabec2",
+ "support"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/no-redirect/same-origin-upgrade.http.html": [
- "be879a223147a9f9824f63665aea3b7614be1516",
+ "referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-https.swap-origin.http.html": [
+ "c91e2027091845c497083e7a5aa5cd77f1d62e78",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html": [
- "95973ce73085d514495c4faa60c8612de7e15db7",
- "testharness"
+ "referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-https.swap-origin.http.html.headers": [
+ "be66cf9321103b1397670f3acc89cecc09aabec2",
+ "support"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-upgrade.http.html": [
- "fb2ae653afe0150e29f9fb7c9c5283732623d66a",
+ "referrer-policy/gen/top.http-rp/same-origin/img-tag/same-http.keep-origin.http.html": [
+ "f2b58faa4d86f1bf2e17dc7824f14443ce4571bb",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/no-redirect/same-origin-upgrade.http.html": [
- "13669d31a6983b03ce98334f3b59769f00f9666f",
- "testharness"
+ "referrer-policy/gen/top.http-rp/same-origin/img-tag/same-http.keep-origin.http.html.headers": [
+ "be66cf9321103b1397670f3acc89cecc09aabec2",
+ "support"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html": [
- "0f8985d142763e74fbfb7cf227515ccde5825d35",
+ "referrer-policy/gen/top.http-rp/same-origin/img-tag/same-http.no-redirect.http.html": [
+ "95dcbba40a1b5c100a60927dff9f2397c2d1310b",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-upgrade.http.html": [
- "26434dd0a05af0bc88bddecdc28dd5c68c2794d3",
- "testharness"
+ "referrer-policy/gen/top.http-rp/same-origin/img-tag/same-http.no-redirect.http.html.headers": [
+ "be66cf9321103b1397670f3acc89cecc09aabec2",
+ "support"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/no-redirect/same-origin-upgrade.http.html": [
- "62e3849d679f80d7ffd4bf0c8acb2eca2ba90844",
+ "referrer-policy/gen/top.http-rp/same-origin/img-tag/same-http.swap-origin.http.html": [
+ "ccdaab708b34f3dabb65104161c31d0b867af681",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-insecure.http.html": [
- "6a09e53315ab7fa644b785f3de0f5285aa05fbf2",
- "testharness"
+ "referrer-policy/gen/top.http-rp/same-origin/img-tag/same-http.swap-origin.http.html.headers": [
+ "be66cf9321103b1397670f3acc89cecc09aabec2",
+ "support"
],
- "referrer-policy/origin/attr-referrer/cross-origin/http-http/a-tag/no-redirect/generic.http.html": [
- "ef0836b8e8759325d50c23bcc206b5fe974e2593",
+ "referrer-policy/gen/top.http-rp/same-origin/img-tag/same-https.swap-origin.http.html": [
+ "1224211f845b2283baf3bd52f3039af924d5b3eb",
"testharness"
],
- "referrer-policy/origin/attr-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html": [
- "86f6a004c32706f57518b11600e41212876de0c6",
- "testharness"
+ "referrer-policy/gen/top.http-rp/same-origin/img-tag/same-https.swap-origin.http.html.headers": [
+ "be66cf9321103b1397670f3acc89cecc09aabec2",
+ "support"
],
- "referrer-policy/origin/attr-referrer/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html": [
- "c404fcf03f9e76a1408f2387b338d9c6335333a7",
+ "referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-http.keep-origin.http.html": [
+ "35fac64aafb0a0881c293d6ce22342b02f499f21",
"testharness"
],
- "referrer-policy/origin/attr-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html": [
- "f3f701fd230d672c61772c7054201569a1f59173",
- "testharness"
+ "referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-http.keep-origin.http.html.headers": [
+ "be66cf9321103b1397670f3acc89cecc09aabec2",
+ "support"
],
- "referrer-policy/origin/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html": [
- "2ea65da273ee14f51844c0ff2cd82d814e0d9901",
+ "referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-http.no-redirect.http.html": [
+ "ccdc442b35a81bc5318eccfccb403cfada422922",
"testharness"
],
- "referrer-policy/origin/attr-referrer/cross-origin/http-http/img-tag/no-redirect/generic.http.html": [
- "90a500cfae7b89c2a8541b58e8ce0804d0ab4718",
- "testharness"
+ "referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-http.no-redirect.http.html.headers": [
+ "be66cf9321103b1397670f3acc89cecc09aabec2",
+ "support"
],
- "referrer-policy/origin/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html": [
- "79c96e6f2b418a2bd7b07009a0b7d9270b2d8198",
+ "referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-http.swap-origin.http.html": [
+ "0e9b3556af2640c3089f05a7c43fa6252c5b6def",
"testharness"
],
- "referrer-policy/origin/attr-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html": [
- "714a08bc7bd4da9ff1812fd31768613d99df042d",
- "testharness"
+ "referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-http.swap-origin.http.html.headers": [
+ "be66cf9321103b1397670f3acc89cecc09aabec2",
+ "support"
],
- "referrer-policy/origin/attr-referrer/cross-origin/http-http/script-tag/no-redirect/generic.http.html": [
- "ff7e409b8d98db62ff9f3c442509d66f0e7919ac",
+ "referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-https.keep-origin.http.html": [
+ "e5b72cf07434a86d5b13369037f73f17bb296fc5",
"testharness"
],
- "referrer-policy/origin/attr-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html": [
- "6e914683ee821997b67dee5cc1c0daf52986af15",
- "testharness"
+ "referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-https.keep-origin.http.html.headers": [
+ "be66cf9321103b1397670f3acc89cecc09aabec2",
+ "support"
],
- "referrer-policy/origin/attr-referrer/cross-origin/http-https/a-tag/no-redirect/generic.http.html": [
- "1a8ab2b48306295d1b8f3eb87d8dfbc50f0b7358",
+ "referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-https.no-redirect.http.html": [
+ "c00d12de0b1d42bf6138b75478fd2b4d0be263d0",
"testharness"
],
- "referrer-policy/origin/attr-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html": [
- "4f8dadde3c41e15e568b9a6321e57b9cdfbdfe76",
- "testharness"
+ "referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-https.no-redirect.http.html.headers": [
+ "be66cf9321103b1397670f3acc89cecc09aabec2",
+ "support"
],
- "referrer-policy/origin/attr-referrer/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html": [
- "8f130d28a17578f82edb8543e17aa4b045289b8d",
+ "referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-https.swap-origin.http.html": [
+ "956910d4f8114f650c8b0891580e1c45bbe7425d",
"testharness"
],
- "referrer-policy/origin/attr-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html": [
- "75eadba3d1efa74cdc8c978f997963481e2b59f9",
- "testharness"
+ "referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-https.swap-origin.http.html.headers": [
+ "be66cf9321103b1397670f3acc89cecc09aabec2",
+ "support"
],
- "referrer-policy/origin/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html": [
- "4fe3af9ffd3bb4b077f3c65e7f1f8817cce4685d",
+ "referrer-policy/gen/top.http-rp/same-origin/script-tag/same-http.keep-origin.http.html": [
+ "64907c87168282ea35dcb9241ff95bbfd76d4ef7",
"testharness"
],
- "referrer-policy/origin/attr-referrer/cross-origin/http-https/img-tag/no-redirect/generic.http.html": [
- "48631e39d2622d7d3e3133314c761790bdc00957",
- "testharness"
+ "referrer-policy/gen/top.http-rp/same-origin/script-tag/same-http.keep-origin.http.html.headers": [
+ "be66cf9321103b1397670f3acc89cecc09aabec2",
+ "support"
],
- "referrer-policy/origin/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html": [
- "3b10e291d3361090bb84e60264154aeccbd17e1d",
+ "referrer-policy/gen/top.http-rp/same-origin/script-tag/same-http.no-redirect.http.html": [
+ "09b1c1f74493eb63433e8bcdbb9389239d9cd806",
"testharness"
],
- "referrer-policy/origin/attr-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html": [
- "bbc4061c2d27c37dc54d6be19a831c6aa86f460e",
- "testharness"
+ "referrer-policy/gen/top.http-rp/same-origin/script-tag/same-http.no-redirect.http.html.headers": [
+ "be66cf9321103b1397670f3acc89cecc09aabec2",
+ "support"
],
- "referrer-policy/origin/attr-referrer/cross-origin/http-https/script-tag/no-redirect/generic.http.html": [
- "2d2ef35f6812f46c99af481956c3292dc69f12b4",
+ "referrer-policy/gen/top.http-rp/same-origin/script-tag/same-http.swap-origin.http.html": [
+ "a5307e7bc4b6164cff02e9d71a65b367f33f7347",
"testharness"
],
- "referrer-policy/origin/attr-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html": [
- "47c51d9df663b03012695da3516a02e6ab0695c5",
- "testharness"
+ "referrer-policy/gen/top.http-rp/same-origin/script-tag/same-http.swap-origin.http.html.headers": [
+ "be66cf9321103b1397670f3acc89cecc09aabec2",
+ "support"
],
- "referrer-policy/origin/attr-referrer/same-origin/http-http/a-tag/no-redirect/generic.http.html": [
- "330d3f0f907d853eb503531137c7deecf4a05b6f",
+ "referrer-policy/gen/top.http-rp/same-origin/script-tag/same-https.swap-origin.http.html": [
+ "e15574fbc4bc26732a458071202402e27f077da0",
"testharness"
],
- "referrer-policy/origin/attr-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html": [
- "ea15eec31891a4328f5cebf1d47df7d42f151a38",
- "testharness"
+ "referrer-policy/gen/top.http-rp/same-origin/script-tag/same-https.swap-origin.http.html.headers": [
+ "be66cf9321103b1397670f3acc89cecc09aabec2",
+ "support"
],
- "referrer-policy/origin/attr-referrer/same-origin/http-http/iframe-tag/no-redirect/generic.http.html": [
- "61323de7a029a42918dffd54dd6590fcdf4d2d8f",
+ "referrer-policy/gen/top.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html": [
+ "fa383bbb81467b24b2cde3a227a378a7995e6200",
"testharness"
],
- "referrer-policy/origin/attr-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html": [
- "c59ee9d340c69148e2bdb886d4d52abae1f8f99a",
- "testharness"
+ "referrer-policy/gen/top.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html.headers": [
+ "be66cf9321103b1397670f3acc89cecc09aabec2",
+ "support"
],
- "referrer-policy/origin/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html": [
- "51b9ba265647a4b6dabe21e112721d0dce0ce7e6",
+ "referrer-policy/gen/top.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html": [
+ "ecd1f5a1658447f3d301609ab1857bcedb0dc13b",
"testharness"
],
- "referrer-policy/origin/attr-referrer/same-origin/http-http/img-tag/no-redirect/generic.http.html": [
- "72e74ac6802a9cf6de29353dcde4dea78c65ddee",
- "testharness"
+ "referrer-policy/gen/top.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html.headers": [
+ "be66cf9321103b1397670f3acc89cecc09aabec2",
+ "support"
],
- "referrer-policy/origin/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html": [
- "39c651732647ee15c47c8f32c7258442bae8370d",
+ "referrer-policy/gen/top.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html": [
+ "0271011060137f688da487fc02fab7b6d5b78c92",
"testharness"
],
- "referrer-policy/origin/attr-referrer/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html": [
- "9af146296a2a51b9c76b3267c93a89c22f4bc3b1",
- "testharness"
+ "referrer-policy/gen/top.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html.headers": [
+ "be66cf9321103b1397670f3acc89cecc09aabec2",
+ "support"
],
- "referrer-policy/origin/attr-referrer/same-origin/http-http/script-tag/no-redirect/generic.http.html": [
- "4000dd3467dbccd3d31826653b47ad01ff54e37a",
+ "referrer-policy/gen/top.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html": [
+ "30deddfd1a3eefea98c9f0cc9d06cda603c9bd08",
"testharness"
],
- "referrer-policy/origin/attr-referrer/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html": [
- "547c19ff4852446c7766e2e7229939ad02ba0284",
- "testharness"
+ "referrer-policy/gen/top.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html.headers": [
+ "be66cf9321103b1397670f3acc89cecc09aabec2",
+ "support"
],
- "referrer-policy/origin/attr-referrer/same-origin/http-https/a-tag/no-redirect/generic.http.html": [
- "ec64d6fff5a3033dbad357fc7b16a377907a0311",
+ "referrer-policy/gen/top.http-rp/same-origin/worker-module/same-http.keep-origin.http.html": [
+ "5a734b9201d3b330b3d12fd3b7b1729234854caa",
"testharness"
],
- "referrer-policy/origin/attr-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html": [
- "2623fe82db01c67d5339d87afb0340e9e5b8af89",
- "testharness"
+ "referrer-policy/gen/top.http-rp/same-origin/worker-module/same-http.keep-origin.http.html.headers": [
+ "be66cf9321103b1397670f3acc89cecc09aabec2",
+ "support"
],
- "referrer-policy/origin/attr-referrer/same-origin/http-https/iframe-tag/no-redirect/generic.http.html": [
- "adce8bdb5693cf9164c801b358c971adf44ae33e",
+ "referrer-policy/gen/top.http-rp/same-origin/worker-module/same-http.no-redirect.http.html": [
+ "fac2c79ad64d31f547833db661131fe0a95f3f70",
"testharness"
],
- "referrer-policy/origin/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html": [
- "fbfb700eb942f4f81b60865acc65a95b76d24a15",
- "testharness"
+ "referrer-policy/gen/top.http-rp/same-origin/worker-module/same-http.no-redirect.http.html.headers": [
+ "be66cf9321103b1397670f3acc89cecc09aabec2",
+ "support"
],
- "referrer-policy/origin/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html": [
- "68a33b74a18b0d22299f590b925c9485c883b453",
+ "referrer-policy/gen/top.http-rp/same-origin/xhr/cross-http.keep-origin.http.html": [
+ "d70c192e45add0e8103947e8557f84a8ed0f690e",
"testharness"
],
- "referrer-policy/origin/attr-referrer/same-origin/http-https/img-tag/no-redirect/generic.http.html": [
- "40e7caed48554bee235dd35989bd1f606dbf33d0",
- "testharness"
+ "referrer-policy/gen/top.http-rp/same-origin/xhr/cross-http.keep-origin.http.html.headers": [
+ "be66cf9321103b1397670f3acc89cecc09aabec2",
+ "support"
],
- "referrer-policy/origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html": [
- "7992aa6e009b7eae992387bebbdfe9fd04cdbf76",
+ "referrer-policy/gen/top.http-rp/same-origin/xhr/cross-http.no-redirect.http.html": [
+ "1cf3b441ce999fd89fc9186a32442ac4ffdaf2a3",
"testharness"
],
- "referrer-policy/origin/attr-referrer/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html": [
- "9c4011d2817e6fa18ad45b98b4cf60dbe862b48c",
- "testharness"
+ "referrer-policy/gen/top.http-rp/same-origin/xhr/cross-http.no-redirect.http.html.headers": [
+ "be66cf9321103b1397670f3acc89cecc09aabec2",
+ "support"
],
- "referrer-policy/origin/attr-referrer/same-origin/http-https/script-tag/no-redirect/generic.http.html": [
- "b174ef4feca3b4ba3edecdef4b5977f9f81e4783",
+ "referrer-policy/gen/top.http-rp/same-origin/xhr/cross-http.swap-origin.http.html": [
+ "f8b167293ffb25fd132a9994fdee07f06ad743a5",
"testharness"
],
- "referrer-policy/origin/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html": [
- "6d987fbcb5253f051dc4d3e2999a442fcfcfc56a",
- "testharness"
+ "referrer-policy/gen/top.http-rp/same-origin/xhr/cross-http.swap-origin.http.html.headers": [
+ "be66cf9321103b1397670f3acc89cecc09aabec2",
+ "support"
],
- "referrer-policy/origin/http-rp/cross-origin/http-http/a-tag/no-redirect/generic.http.html": [
- "9fa486e6ef1b9cad07b3c8574951a506b77c39a2",
+ "referrer-policy/gen/top.http-rp/same-origin/xhr/cross-https.keep-origin.http.html": [
+ "34413f44d0b83e77bccca9c14a1a593050a6596b",
"testharness"
],
- "referrer-policy/origin/http-rp/cross-origin/http-http/a-tag/no-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/same-origin/xhr/cross-https.keep-origin.http.html.headers": [
+ "be66cf9321103b1397670f3acc89cecc09aabec2",
"support"
],
- "referrer-policy/origin/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html": [
- "5577dd290e88f325f369e56ebdfe9f1d94db979b",
+ "referrer-policy/gen/top.http-rp/same-origin/xhr/cross-https.no-redirect.http.html": [
+ "2dcc45119a15ab547137105c542956fb8effd911",
"testharness"
],
- "referrer-policy/origin/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/same-origin/xhr/cross-https.no-redirect.http.html.headers": [
+ "be66cf9321103b1397670f3acc89cecc09aabec2",
"support"
],
- "referrer-policy/origin/http-rp/cross-origin/http-http/fetch-request/no-redirect/generic.http.html": [
- "3dfd7e3526ccfce8b642ad96cfe65eb256f639dd",
+ "referrer-policy/gen/top.http-rp/same-origin/xhr/cross-https.swap-origin.http.html": [
+ "843b7b8bd8e5e325748d0ddce9db0a319848d2c3",
"testharness"
],
- "referrer-policy/origin/http-rp/cross-origin/http-http/fetch-request/no-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/same-origin/xhr/cross-https.swap-origin.http.html.headers": [
+ "be66cf9321103b1397670f3acc89cecc09aabec2",
"support"
],
- "referrer-policy/origin/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html": [
- "5fbda64f1dfe568f6c365534940d3e638fc5df6c",
+ "referrer-policy/gen/top.http-rp/same-origin/xhr/same-http.keep-origin.http.html": [
+ "e8e560af2a0dda4da897625376dbdda427e7f252",
"testharness"
],
- "referrer-policy/origin/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/same-origin/xhr/same-http.keep-origin.http.html.headers": [
+ "be66cf9321103b1397670f3acc89cecc09aabec2",
"support"
],
- "referrer-policy/origin/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html": [
- "b498a7d7a3112feacd4377861ca4d0b16465140b",
+ "referrer-policy/gen/top.http-rp/same-origin/xhr/same-http.no-redirect.http.html": [
+ "12198095da24c25ee880af6c5cd7492c2afd814b",
"testharness"
],
- "referrer-policy/origin/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/same-origin/xhr/same-http.no-redirect.http.html.headers": [
+ "be66cf9321103b1397670f3acc89cecc09aabec2",
"support"
],
- "referrer-policy/origin/http-rp/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html": [
- "cf30937880f520772ccfc5dcf624f6e5247c426d",
+ "referrer-policy/gen/top.http-rp/same-origin/xhr/same-http.swap-origin.http.html": [
+ "300bcba4cf80b031919a7eb371d2f1b8c0b818ba",
"testharness"
],
- "referrer-policy/origin/http-rp/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/same-origin/xhr/same-http.swap-origin.http.html.headers": [
+ "be66cf9321103b1397670f3acc89cecc09aabec2",
"support"
],
- "referrer-policy/origin/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html": [
- "5123048a9617309152bcd479671d6b6057691daa",
+ "referrer-policy/gen/top.http-rp/same-origin/xhr/same-https.swap-origin.http.html": [
+ "82729f56cca7ce6a81478f240171c1b3c74044f7",
"testharness"
],
- "referrer-policy/origin/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/same-origin/xhr/same-https.swap-origin.http.html.headers": [
+ "be66cf9321103b1397670f3acc89cecc09aabec2",
"support"
],
- "referrer-policy/origin/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html": [
- "1a6b871132705b6a9673af3cfec02438df0dce8b",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html": [
+ "856bd37ac9bfd9bdad5b035c8e4573dd881fb8eb",
"testharness"
],
- "referrer-policy/origin/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/origin/http-rp/cross-origin/http-http/img-tag/no-redirect/generic.http.html": [
- "6ecead7d50e338377abab19dd7597cf4fd94e8f5",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html": [
+ "fd4826682aca7e2d8167cb094e9848cee807771c",
"testharness"
],
- "referrer-policy/origin/http-rp/cross-origin/http-http/img-tag/no-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/origin/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html": [
- "abaf6d3efb894927db66ffb481db1a11ca61e8ae",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html": [
+ "fd82f1b1104bb92e6e34d864bbb46e09933c9515",
"testharness"
],
- "referrer-policy/origin/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/origin/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html": [
- "849754d0a23a9fb285da2181af2b4fca38aa5788",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html": [
+ "223f1866e9d9105627032ae793772569afd71bf4",
"testharness"
],
- "referrer-policy/origin/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/origin/http-rp/cross-origin/http-http/script-tag/no-redirect/generic.http.html": [
- "c9009ba9bb480c1f5ca896db4e277663e6e0cd15",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html": [
+ "6c803c7652774c9f771a9d4a3983f26ccfed79c8",
"testharness"
],
- "referrer-policy/origin/http-rp/cross-origin/http-http/script-tag/no-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/origin/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html": [
- "e10011d34f1c255e8dc1bba44421cbc394ec1c56",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html": [
+ "d25921963348bd1fff8da88134a80a168816a3f6",
"testharness"
],
- "referrer-policy/origin/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/origin/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html": [
- "3a8045104ba6f925939ef7dc001be3b1b79e6e23",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html": [
+ "30a6824fb622799ad7673ba8a6f6d61e6ce55d26",
"testharness"
],
- "referrer-policy/origin/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/origin/http-rp/cross-origin/http-http/xhr-request/no-redirect/generic.http.html": [
- "7e4275cad39a8ffd4b786f7170e4f5242f805e01",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html": [
+ "2034b69168930ce141f02522d5070f6be3fc71f1",
"testharness"
],
- "referrer-policy/origin/http-rp/cross-origin/http-http/xhr-request/no-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/origin/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html": [
- "130958a292a093ff546e19c75c0b31b7e72eb6d2",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html": [
+ "dd8050cb07cf6a517e7ec003c5e9b2ad88e8f726",
"testharness"
],
- "referrer-policy/origin/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/origin/http-rp/cross-origin/http-https/a-tag/no-redirect/generic.http.html": [
- "40606039bedef1fe8d51e73c3591c805d9542caa",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html": [
+ "ba8468ff86fab2ad05d340e5ac2720307a1b15cc",
"testharness"
],
- "referrer-policy/origin/http-rp/cross-origin/http-https/a-tag/no-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/origin/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html": [
- "35fa4d4e120634793d85b490079c73d819d91b7c",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html": [
+ "40905ede8f74a24cdcc2310cd573a27f7b6bcb71",
"testharness"
],
- "referrer-policy/origin/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/origin/http-rp/cross-origin/http-https/fetch-request/no-redirect/generic.http.html": [
- "8bbdbcaf518e5768d1a5ab0122614e01b19fe355",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html": [
+ "566975302f7b500b6cdaccfe87810a064238de97",
"testharness"
],
- "referrer-policy/origin/http-rp/cross-origin/http-https/fetch-request/no-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/origin/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html": [
- "f765d8e5ed47caec82d4d7e8e73ea60447830ca8",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html": [
+ "b68c33991244b835f3e87c29be6132ae38838780",
"testharness"
],
- "referrer-policy/origin/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/origin/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html": [
- "81abd80a316168a43017a6ced1704c3fa9737ab9",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html": [
+ "7949aae354d0cd64f0b696ed55f32ceef5a88722",
"testharness"
],
- "referrer-policy/origin/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/origin/http-rp/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html": [
- "dce1889cdafd54042b8bbe2ee8992ec69b235351",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html": [
+ "654c8d00c861a99b41258eed0ee8913ddf06178a",
"testharness"
],
- "referrer-policy/origin/http-rp/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/origin/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html": [
- "2d300936294a87e13aec983a5775cc6e5c2d9e3a",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html": [
+ "b9bfa6a5214c78aa837d3e90d278d4bdc968eb6c",
"testharness"
],
- "referrer-policy/origin/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/origin/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html": [
- "7490ce2006c713de56b2901f993ad48465f081e3",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html": [
+ "d403af05d7583bc4693fc06338d451287aaad0ac",
"testharness"
],
- "referrer-policy/origin/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/origin/http-rp/cross-origin/http-https/img-tag/no-redirect/generic.http.html": [
- "efa72adcc5987f23569853c8539146e856181d2c",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html": [
+ "87820e5812ec93a5ad7319edc9f69ca097b6f5e0",
"testharness"
],
- "referrer-policy/origin/http-rp/cross-origin/http-https/img-tag/no-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/origin/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html": [
- "6c5960010bb00a6757733a52638d402c05e6acc5",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html": [
+ "f5dfb70043f6018fb33f710aa834e93dfa42ade8",
"testharness"
],
- "referrer-policy/origin/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/origin/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html": [
- "c3f9f1540c819fe7fc7ef246f646e6607f555710",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html": [
+ "a9f0ac0a96744dc10f8cba17dac21d0fb01b8689",
"testharness"
],
- "referrer-policy/origin/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/origin/http-rp/cross-origin/http-https/script-tag/no-redirect/generic.http.html": [
- "972258f7c091c7d4f9caefbab141851e47747b35",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html": [
+ "98ae2c0006f71deb54700b2f692db91017434071",
"testharness"
],
- "referrer-policy/origin/http-rp/cross-origin/http-https/script-tag/no-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/origin/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html": [
- "a0b43f146fc6f953ea7236063d57f64a4644d9e7",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html": [
+ "8c4a715c277640cad882596d65b9bae527409727",
"testharness"
],
- "referrer-policy/origin/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/origin/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html": [
- "e4b8632fdcd82b7ba4bb6478b661edba430a7b08",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html": [
+ "8c477e58e5ecefbebdd51d3ad0ff31c97fc51dd4",
"testharness"
],
- "referrer-policy/origin/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/origin/http-rp/cross-origin/http-https/xhr-request/no-redirect/generic.http.html": [
- "f01ce4e02899682af817b4493162e7d967b418fe",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html": [
+ "37d55ef305f9cc32f569e8c791efcb0c6e8ed6ec",
"testharness"
],
- "referrer-policy/origin/http-rp/cross-origin/http-https/xhr-request/no-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/origin/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html": [
- "f0d6a0fd05418ea243b3d310db3dec726cf01866",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html": [
+ "cf39ccd38ad17b7ce488771b0b767aa6a953abd3",
"testharness"
],
- "referrer-policy/origin/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/origin/http-rp/same-origin/http-http/a-tag/no-redirect/generic.http.html": [
- "669b174a081ddf8a9a343731ed95a3a0304af16e",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html": [
+ "f447202e3d51e083c36b6304a042d7533c448129",
"testharness"
],
- "referrer-policy/origin/http-rp/same-origin/http-http/a-tag/no-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/origin/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html": [
- "f62fcf98e4074ef6070dbddbdcddbed45915aa11",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html": [
+ "e83c17e2b87f3e5c092b5824308391f6d97abdcf",
"testharness"
],
- "referrer-policy/origin/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/origin/http-rp/same-origin/http-http/fetch-request/no-redirect/generic.http.html": [
- "c6c6a1e4837c818e2deb39ab4dbae2656ad8102a",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html": [
+ "113be97571c3b7321153f6e3ebd4cd6ee73711f8",
"testharness"
],
- "referrer-policy/origin/http-rp/same-origin/http-http/fetch-request/no-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/origin/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html": [
- "b74b0d48002ebe35526fdce593f4525d736618e6",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html": [
+ "c52b4f5535bb060ee4f11d5e02493bfb20724dc8",
"testharness"
],
- "referrer-policy/origin/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/origin/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html": [
- "e18a7d6a716ed458b3be0773bb971171513d797a",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html": [
+ "3834bf371f23ab537d3c24910649d47e3bd2d4e1",
"testharness"
],
- "referrer-policy/origin/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/origin/http-rp/same-origin/http-http/iframe-tag/no-redirect/generic.http.html": [
- "792f0231e440f4ca26fe0382dab94bbb31e9d86c",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html": [
+ "02cf5abed0cb33ef826f6f0b9e1553ff2a9cec09",
"testharness"
],
- "referrer-policy/origin/http-rp/same-origin/http-http/iframe-tag/no-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/origin/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html": [
- "a3d13d7ef6b582c7d5c59807db2b5723ec81969a",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html": [
+ "ef022b72dfae2ba371291cdaecc39c43d6a6324d",
"testharness"
],
- "referrer-policy/origin/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/origin/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html": [
- "e4dc43e104e21c1b31be2d75f1d59b16d55bbf7e",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.swap-origin.http.html": [
+ "a79346508dc12e80e00f90e45cee8e1d5714f495",
"testharness"
],
- "referrer-policy/origin/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.swap-origin.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/origin/http-rp/same-origin/http-http/img-tag/no-redirect/generic.http.html": [
- "fcc9e44e29c3bb03cd026dd316c58fe74894f368",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-https.keep-origin.http.html": [
+ "eeb927bfa6033bc565bec94666d0559ff72dfa1c",
"testharness"
],
- "referrer-policy/origin/http-rp/same-origin/http-http/img-tag/no-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-https.keep-origin.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/origin/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html": [
- "41d15b0fcde677c901a156c64013492373094f2c",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-https.no-redirect.http.html": [
+ "1c0e791357fcf6869494d5ef2d0c681b864457ac",
"testharness"
],
- "referrer-policy/origin/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-https.no-redirect.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/origin/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/generic.http.html": [
- "8f54379c868928a7880d49226ab03565e9746408",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-https.swap-origin.http.html": [
+ "7b30449b1f96592cf86f671b30891c8b091ee317",
"testharness"
],
- "referrer-policy/origin/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-https.swap-origin.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/origin/http-rp/same-origin/http-http/module-worker/no-redirect/generic.http.html": [
- "fabac2224ef801303534c71343c2ce48926fccb0",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html": [
+ "a20e420662d9941b553ea6ebf45fe0e79bad319d",
"testharness"
],
- "referrer-policy/origin/http-rp/same-origin/http-http/module-worker/no-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/origin/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html": [
- "9635d1c76c6aeb0408015d5bdc3c63ebcc18300d",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html": [
+ "969f993927ad03aea9a8215703d719e6fa11ed9e",
"testharness"
],
- "referrer-policy/origin/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/origin/http-rp/same-origin/http-http/script-tag/no-redirect/generic.http.html": [
- "b825d86ed65e7aa4fb5f7631cc63fa18c70798b5",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html": [
+ "47f37f86f3a3d61ebaffd909d065dcca438b4030",
"testharness"
],
- "referrer-policy/origin/http-rp/same-origin/http-http/script-tag/no-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/origin/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html": [
- "a8231d341c6681e1378813040cf54d56bb17894f",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html": [
+ "77df78413f27e00a0695c3452c7df821bdd76aa4",
"testharness"
],
- "referrer-policy/origin/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/origin/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/generic.http.html": [
- "ac410b0914267c2844a77dad9a23e46b3eca9ce9",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html": [
+ "af9cf983258b5c759fedba94b7b776bdf01340eb",
"testharness"
],
- "referrer-policy/origin/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/origin/http-rp/same-origin/http-http/shared-worker/no-redirect/generic.http.html": [
- "53d238278673ae2a50331cf93fa3886f1d2c52a2",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html": [
+ "020c41e1773f22c79b2ed28b878c19a22377a201",
"testharness"
],
- "referrer-policy/origin/http-rp/same-origin/http-http/shared-worker/no-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/origin/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/generic.http.html": [
- "35418f29644db9d575656de22c51c7d06309a181",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html": [
+ "bd169400464438b94b7cb0b99a221a96cee59f21",
"testharness"
],
- "referrer-policy/origin/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/origin/http-rp/same-origin/http-http/worker-request/no-redirect/generic.http.html": [
- "4d62a43436b8a5de893c3551fd9475eefbc146c4",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html": [
+ "ed74429ca15fd5ab81bd3be203805a2ca871f57d",
"testharness"
],
- "referrer-policy/origin/http-rp/same-origin/http-http/worker-request/no-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/origin/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html": [
- "ae89a6a0880ed3e835b9607555285c472d599aac",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.swap-origin.http.html": [
+ "ebcc6bac5b99310ed3d7013cd9de9a0749f3c942",
"testharness"
],
- "referrer-policy/origin/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.swap-origin.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/origin/http-rp/same-origin/http-http/xhr-request/no-redirect/generic.http.html": [
- "06c3b88fb1cf61423063208a8393720eb3a30bdc",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-https.keep-origin.http.html": [
+ "cc8c6adb809820b970944e248d00ca46320b9fab",
"testharness"
],
- "referrer-policy/origin/http-rp/same-origin/http-http/xhr-request/no-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-https.keep-origin.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/origin/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html": [
- "237a5f0f491134bd4144f67d2dba8098b381f4d5",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-https.no-redirect.http.html": [
+ "1c1bb7697f0b2b700a916ac233cd7e7d6222fcc9",
"testharness"
],
- "referrer-policy/origin/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-https.no-redirect.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/origin/http-rp/same-origin/http-https/a-tag/no-redirect/generic.http.html": [
- "ed249742bfda996c31ee78498720021f586daf60",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-https.swap-origin.http.html": [
+ "df62047bff0915d2dff5713b6e3c49c591939965",
"testharness"
],
- "referrer-policy/origin/http-rp/same-origin/http-https/a-tag/no-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-https.swap-origin.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html": [
- "ec9ed5db2687a59f6adb2f76f6ac0c5ecfe96608",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html": [
+ "17a8d06b6d85883de8c0b8281c8641951d292532",
"testharness"
],
- "referrer-policy/origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/origin/http-rp/same-origin/http-https/fetch-request/no-redirect/generic.http.html": [
- "545d5215b80a71b53ace5c2e8c6b974224d1f95e",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html": [
+ "85c37ed2762152149710ed148fa05597e6e02d34",
"testharness"
],
- "referrer-policy/origin/http-rp/same-origin/http-https/fetch-request/no-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html": [
- "0a8b8a98c183667eda8f515bc6b0b83678aebb55",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html": [
+ "4d8aedb40040d52a5db539047d4e6848a24cbf9e",
"testharness"
],
- "referrer-policy/origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html": [
- "a4efc8f4d6b5898f2bee1ed04c462d5798587b01",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html": [
+ "52b029e38f3e8f1de30f41b8b2cd213a4afb2a5e",
"testharness"
],
- "referrer-policy/origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/generic.http.html": [
- "5ff897669a4aa2933728d9d4347ca05de0723d9d",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html": [
+ "f9629af5961d1d948d19930aa6ec4f3623a9e0ed",
"testharness"
],
- "referrer-policy/origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html": [
- "51d8fd3ede2ac355c977f273055f31333e6e7e67",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html": [
+ "751470c0f1183e010603dc754399944737d6f6d0",
"testharness"
],
- "referrer-policy/origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html": [
- "bf13e92fa48c9a86934fd2b3077b5edb037302c4",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-http.keep-origin.http.html": [
+ "5bfcfcf0c3991eec80ac3581af1413c7b9aae504",
"testharness"
],
- "referrer-policy/origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-http.keep-origin.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/origin/http-rp/same-origin/http-https/img-tag/no-redirect/generic.http.html": [
- "d1fddfb6a424464bf3fc032b050c8c9d9dacb4a2",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-http.no-redirect.http.html": [
+ "df7902ed007510b1f958e17dcc25e5a2ad8faca7",
"testharness"
],
- "referrer-policy/origin/http-rp/same-origin/http-https/img-tag/no-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-http.no-redirect.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html": [
- "cbdc2336adaa8f7825b7e8ca1e0412049a7c237b",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-http.swap-origin.http.html": [
+ "aa3ae70aac1a9de88ebb0ec60b181f8a059fd9bc",
"testharness"
],
- "referrer-policy/origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-http.swap-origin.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html": [
- "8563ebfd9fe6bb629df2f48057c8bbbf4d09687f",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-https.keep-origin.http.html": [
+ "7dcd6a27c5d13b9f90f2074fea897db680c604e0",
"testharness"
],
- "referrer-policy/origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-https.keep-origin.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/origin/http-rp/same-origin/http-https/script-tag/no-redirect/generic.http.html": [
- "6365a8bcf02aea26b97739bd0a139f86657fd253",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-https.no-redirect.http.html": [
+ "900b0694a598506c6985b1a1fb68deec1fceba08",
"testharness"
],
- "referrer-policy/origin/http-rp/same-origin/http-https/script-tag/no-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-https.no-redirect.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html": [
- "35002016c5ad9c9b62d740ee3ac99c9a4415ae87",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-https.swap-origin.http.html": [
+ "733ccaa102d5eac3281b0d314737f70539133dd6",
"testharness"
],
- "referrer-policy/origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-https.swap-origin.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html": [
- "0f0d047fffaab0a5c33871a07c7cb684c8e2d4f4",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html": [
+ "32d9172e8075953fdcbde7696f32b9966f64577f",
"testharness"
],
- "referrer-policy/origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/origin/http-rp/same-origin/http-https/xhr-request/no-redirect/generic.http.html": [
- "4c9cd6fdaa190c73ddcde3affc953ea41b9c432c",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html": [
+ "1d2c73a4feed949d59ba9ad7ca580bf6b487f024",
"testharness"
],
- "referrer-policy/origin/http-rp/same-origin/http-https/xhr-request/no-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html": [
- "d9787a4e6d5ec0cc67e6b3ef84400246e3608e7b",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.swap-origin.http.html": [
+ "5bd5fc1da3c5036cd2c04c814a66001a2d5aba7e",
"testharness"
],
- "referrer-policy/origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html.headers": [
- "306a53536ac57625957da5cf4ff55e4124276617",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.swap-origin.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
"support"
],
- "referrer-policy/origin/meta-referrer/cross-origin/http-http/a-tag/no-redirect/generic.http.html": [
- "8a7ede0d2ddabaab705f9bc147e884fff273e98b",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-https.keep-origin.http.html": [
+ "83ca559a9cf89a31925cb030e1a524fd18f869ad",
"testharness"
],
- "referrer-policy/origin/meta-referrer/cross-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html": [
- "a150b8ea76d0a10b7adb4ea5d5a4280e2afc2e2b",
- "testharness"
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-https.keep-origin.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
+ "support"
],
- "referrer-policy/origin/meta-referrer/cross-origin/http-http/fetch-request/no-redirect/generic.http.html": [
- "e1c0b2a5b5a470f20dcc0232d07be98f1e3d9dc4",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-https.no-redirect.http.html": [
+ "5e988c33a2c84f1483ee393a225005959e152f36",
"testharness"
],
- "referrer-policy/origin/meta-referrer/cross-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html": [
- "8dc5fd5aa9a1a0d877f7efc474874386909fa5a5",
- "testharness"
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-https.no-redirect.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
+ "support"
],
- "referrer-policy/origin/meta-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html": [
- "f74e8d3cbd5cabffb9a9181ffa2db0a0dd5f35f6",
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-https.swap-origin.http.html": [
+ "e3a7bf037231402b9ac085e795b44db3a2ffd734",
"testharness"
],
- "referrer-policy/origin/meta-referrer/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html": [
- "71d010128640918729fb3bacb01a29b398e5236d",
- "testharness"
+ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-https.swap-origin.http.html.headers": [
+ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1",
+ "support"
],
- "referrer-policy/origin/meta-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html": [
- "c5e42caa8bacf38f0bffff4bd21a125728b1c525",
+ "referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-http.keep-origin.http.html": [
+ "057180a979d20d361e63af85cf9213bed202a51c",
"testharness"
],
- "referrer-policy/origin/meta-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html": [
- "1a5ad9592d5fd28fdbfd06bd2067e58b9c6b4fa7",
- "testharness"
+ "referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-http.keep-origin.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
+ "support"
],
- "referrer-policy/origin/meta-referrer/cross-origin/http-http/img-tag/no-redirect/generic.http.html": [
- "0ada60ada7117218c2211447c60a525bf33f0ca7",
+ "referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-http.no-redirect.http.html": [
+ "3688dc22422961c36f76ad31affe52f006905fd5",
"testharness"
],
- "referrer-policy/origin/meta-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html": [
- "1737905526006bffb455575ebfe0e8bec7167529",
- "testharness"
+ "referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-http.no-redirect.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
+ "support"
],
- "referrer-policy/origin/meta-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html": [
- "f967363820902b6413b1d531ba3eedc4b535771a",
+ "referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-http.swap-origin.http.html": [
+ "1ded06e4b4622a29eec8d4a2a24baa519e6d6136",
"testharness"
],
- "referrer-policy/origin/meta-referrer/cross-origin/http-http/script-tag/no-redirect/generic.http.html": [
- "d4306b793492c681087ecce7dc66609262f3b848",
- "testharness"
+ "referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-http.swap-origin.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
+ "support"
],
- "referrer-policy/origin/meta-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html": [
- "0b0ff184b64f00f320c265679b6946929826e726",
+ "referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-https.keep-origin.http.html": [
+ "06167dd942e859cdcf1ab0977d23b375f24f5468",
"testharness"
],
- "referrer-policy/origin/meta-referrer/cross-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html": [
- "414c8723ca10488c1a42fade46fd983ed5668180",
- "testharness"
+ "referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-https.keep-origin.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
+ "support"
],
- "referrer-policy/origin/meta-referrer/cross-origin/http-http/xhr-request/no-redirect/generic.http.html": [
- "ba53dcf3508ca479c3a425555c514a261256f4e3",
+ "referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-https.no-redirect.http.html": [
+ "a1dee152b5dbc2b0207c18682ba0c79d9c5562db",
"testharness"
],
- "referrer-policy/origin/meta-referrer/cross-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html": [
- "0525b3cd2ee7d33568980d660ad65bce6e54b940",
- "testharness"
+ "referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-https.no-redirect.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
+ "support"
],
- "referrer-policy/origin/meta-referrer/cross-origin/http-https/a-tag/no-redirect/generic.http.html": [
- "60094d7f0abe1838bf39a4f720b77f0f94888a21",
+ "referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-https.swap-origin.http.html": [
+ "d774b21538ca1224385c6ac4b6d7fe200fcb899a",
"testharness"
],
- "referrer-policy/origin/meta-referrer/cross-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html": [
- "35b705119f71b528687537a3a4a011a1e2c5b257",
- "testharness"
+ "referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-https.swap-origin.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
+ "support"
],
- "referrer-policy/origin/meta-referrer/cross-origin/http-https/fetch-request/no-redirect/generic.http.html": [
- "d5908e7ba783dead9e1cb6d2ece29688574d4a96",
+ "referrer-policy/gen/top.http-rp/strict-origin/fetch/same-http.keep-origin.http.html": [
+ "ea3dad3bf8f052351dc3e6af1aeb942c67dbc6c0",
"testharness"
],
- "referrer-policy/origin/meta-referrer/cross-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html": [
- "3be90e5d4ac1efe53fdc105190be8e3b7c2229b3",
- "testharness"
+ "referrer-policy/gen/top.http-rp/strict-origin/fetch/same-http.keep-origin.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
+ "support"
],
- "referrer-policy/origin/meta-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html": [
- "d64247c64475a6107dace6ac486ccb70ed81c631",
+ "referrer-policy/gen/top.http-rp/strict-origin/fetch/same-http.no-redirect.http.html": [
+ "ac35310f0ba4ec2b57403f3e91f95dc25b423e81",
"testharness"
],
- "referrer-policy/origin/meta-referrer/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html": [
- "f9769b95f9f7a92f3030c1c971fb2e2571947ee3",
- "testharness"
+ "referrer-policy/gen/top.http-rp/strict-origin/fetch/same-http.no-redirect.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
+ "support"
],
- "referrer-policy/origin/meta-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html": [
- "7c9b8c83221ceb5e416b6a773d4a19d34fffad06",
+ "referrer-policy/gen/top.http-rp/strict-origin/fetch/same-http.swap-origin.http.html": [
+ "f61aada87f6a504b6075eeac70e8df395d711d06",
"testharness"
],
- "referrer-policy/origin/meta-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html": [
- "483a43cddb138648c2df46f4eb5ab6586c4b8333",
- "testharness"
+ "referrer-policy/gen/top.http-rp/strict-origin/fetch/same-http.swap-origin.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
+ "support"
],
- "referrer-policy/origin/meta-referrer/cross-origin/http-https/img-tag/no-redirect/generic.http.html": [
- "f27831c876c8aa33b2d56b6b39e5d7ab12c2fe43",
+ "referrer-policy/gen/top.http-rp/strict-origin/fetch/same-https.keep-origin.http.html": [
+ "96a82aecc2390c434d7887b49804da17ec7a02ed",
"testharness"
],
- "referrer-policy/origin/meta-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html": [
- "44042cd5008283236daf1483253fd8576c3c17f3",
- "testharness"
+ "referrer-policy/gen/top.http-rp/strict-origin/fetch/same-https.keep-origin.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
+ "support"
],
- "referrer-policy/origin/meta-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html": [
- "2385c83cab9ab56b37f8f5ca2ce8fcfee6ccfe4e",
+ "referrer-policy/gen/top.http-rp/strict-origin/fetch/same-https.no-redirect.http.html": [
+ "024dcdbb855d2cdc172fdb5a6c5e9c5e6ab9b41f",
"testharness"
],
- "referrer-policy/origin/meta-referrer/cross-origin/http-https/script-tag/no-redirect/generic.http.html": [
- "bfe81dde602b875d20403a5be9a34f3120f25dba",
- "testharness"
+ "referrer-policy/gen/top.http-rp/strict-origin/fetch/same-https.no-redirect.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
+ "support"
],
- "referrer-policy/origin/meta-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html": [
- "c4305ba0bc8b52694e6d09047cdc41a9be8dfda2",
+ "referrer-policy/gen/top.http-rp/strict-origin/fetch/same-https.swap-origin.http.html": [
+ "107bd7812f4006f733830f1db8bcb53c50482140",
"testharness"
],
- "referrer-policy/origin/meta-referrer/cross-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html": [
- "7d89052f52f3d8408e8fb3df960974d6c04727e5",
- "testharness"
+ "referrer-policy/gen/top.http-rp/strict-origin/fetch/same-https.swap-origin.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
+ "support"
],
- "referrer-policy/origin/meta-referrer/cross-origin/http-https/xhr-request/no-redirect/generic.http.html": [
- "738ef6b1996f8c28ca7c12c1f350e1c685440394",
+ "referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-http.keep-origin.http.html": [
+ "60b9f6766d19c893d45108db7051529f5ebd165e",
"testharness"
],
- "referrer-policy/origin/meta-referrer/cross-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html": [
- "f34d5494e7db61d9f3399a55d46f1887eff5a89f",
- "testharness"
+ "referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-http.keep-origin.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
+ "support"
],
- "referrer-policy/origin/meta-referrer/same-origin/http-http/a-tag/no-redirect/generic.http.html": [
- "7599f2ff24317f5f4f29cdf28684db78a1cc1553",
+ "referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-http.no-redirect.http.html": [
+ "af995ca2eadacd69b2a826bfbb9897a23513c96b",
"testharness"
],
- "referrer-policy/origin/meta-referrer/same-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html": [
- "3209281673b8ab56398d663cf91d6fd0b27764ec",
- "testharness"
+ "referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-http.no-redirect.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
+ "support"
],
- "referrer-policy/origin/meta-referrer/same-origin/http-http/fetch-request/no-redirect/generic.http.html": [
- "e5d16e24a55b30cd4998f2aa7fde02bcede486ef",
+ "referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-http.swap-origin.http.html": [
+ "60a98bedc8b9b379a7f283dc0a55f344f5cf2c18",
"testharness"
],
- "referrer-policy/origin/meta-referrer/same-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html": [
- "8009f57b1ee263fc1fc06af5887eb3c216742bbd",
- "testharness"
+ "referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-http.swap-origin.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
+ "support"
],
- "referrer-policy/origin/meta-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html": [
- "b702eef57fc14889dea16279430d29635cf1c078",
+ "referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-https.keep-origin.http.html": [
+ "b12f577a879f9d561abcb6c6e7e4242bbcacfb2e",
"testharness"
],
- "referrer-policy/origin/meta-referrer/same-origin/http-http/iframe-tag/no-redirect/generic.http.html": [
- "b97825de1e0cdb56da1510fd908528c1a553be8c",
- "testharness"
+ "referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-https.keep-origin.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
+ "support"
],
- "referrer-policy/origin/meta-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html": [
- "5c73dd4d88d7ca39041b2bac62e1ec9ab0507258",
+ "referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-https.no-redirect.http.html": [
+ "fa99e45193e635591f0db129fc2a22871982f42d",
"testharness"
],
- "referrer-policy/origin/meta-referrer/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html": [
- "f2a25196f712cc72458b8df5a22878fe6aab7e88",
- "testharness"
+ "referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-https.no-redirect.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
+ "support"
],
- "referrer-policy/origin/meta-referrer/same-origin/http-http/img-tag/no-redirect/generic.http.html": [
- "79c61faa4175c79013ec81332d4916f69b9438a0",
+ "referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-https.swap-origin.http.html": [
+ "d5834fb1a1d7aa3fe3e3e3e0e21b0d93449d6c3e",
"testharness"
],
- "referrer-policy/origin/meta-referrer/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html": [
- "3c2117ec0223436fd7fb76000f83ffca1999159c",
- "testharness"
+ "referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-https.swap-origin.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
+ "support"
],
- "referrer-policy/origin/meta-referrer/same-origin/http-http/module-worker/keep-origin-redirect/generic.http.html": [
- "aa9af02fe1e0e1877e0eb31e6bd6647fa3fe0ef7",
+ "referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-http.keep-origin.http.html": [
+ "f10620601c4ba799745b0dbcc66e5bc54cfc2ca3",
"testharness"
],
- "referrer-policy/origin/meta-referrer/same-origin/http-http/module-worker/no-redirect/generic.http.html": [
- "43f4147975566dc072fa4bb1a1b9f7ff24817826",
- "testharness"
+ "referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-http.keep-origin.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
+ "support"
],
- "referrer-policy/origin/meta-referrer/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html": [
- "cd10ed2b6b59793d3d9af2c6c7d90653d4cf7532",
+ "referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-http.no-redirect.http.html": [
+ "256d82897267b418188299398c490d557447180e",
"testharness"
],
- "referrer-policy/origin/meta-referrer/same-origin/http-http/script-tag/no-redirect/generic.http.html": [
- "a1538cc41be67998c463f2f32b262fe78045c003",
- "testharness"
+ "referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-http.no-redirect.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
+ "support"
],
- "referrer-policy/origin/meta-referrer/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html": [
- "4fc2718a910c050e0e204d5b39f00e9b0b1dec0e",
+ "referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-http.swap-origin.http.html": [
+ "582bca8a55d33a3a91c1aff5b1edf617f19aa9f1",
"testharness"
],
- "referrer-policy/origin/meta-referrer/same-origin/http-http/shared-worker/keep-origin-redirect/generic.http.html": [
- "2ffaea9826c621a31f380ffdd02b3a8526c4fd84",
- "testharness"
+ "referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-http.swap-origin.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
+ "support"
],
- "referrer-policy/origin/meta-referrer/same-origin/http-http/shared-worker/no-redirect/generic.http.html": [
- "c997e228e17497a2a993792c1398c5a34756a7bd",
+ "referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-https.keep-origin.http.html": [
+ "0edd958eaa6bb5ad239876fa4df6cfe4d5c93033",
"testharness"
],
- "referrer-policy/origin/meta-referrer/same-origin/http-http/worker-request/keep-origin-redirect/generic.http.html": [
- "2872d59fc514fee21801b670ba49f1ecbfbeae03",
- "testharness"
+ "referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-https.keep-origin.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
+ "support"
],
- "referrer-policy/origin/meta-referrer/same-origin/http-http/worker-request/no-redirect/generic.http.html": [
- "dc7222d37329499858241f58fd3e9a12f656403e",
+ "referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-https.no-redirect.http.html": [
+ "f4225e0e34d838e4d671cc9bf373eef29c3f649e",
"testharness"
],
- "referrer-policy/origin/meta-referrer/same-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html": [
- "a2c953d6e74d7b2b5f7638fe3eb92a13162ef0e9",
- "testharness"
+ "referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-https.no-redirect.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
+ "support"
],
- "referrer-policy/origin/meta-referrer/same-origin/http-http/xhr-request/no-redirect/generic.http.html": [
- "2bf98b8211904e826060157c789f9f78dfe8d5f9",
+ "referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-https.swap-origin.http.html": [
+ "e71abffe43007d69e5674bdb4b9b08f7c92e3904",
"testharness"
],
- "referrer-policy/origin/meta-referrer/same-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html": [
- "0af634a6d27ab6806d3a112646383317ae2e3478",
- "testharness"
+ "referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-https.swap-origin.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
+ "support"
],
- "referrer-policy/origin/meta-referrer/same-origin/http-https/a-tag/no-redirect/generic.http.html": [
- "f3608e17eb9e9b4e00e97af35ecb5a2d27b8a68e",
+ "referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-http.keep-origin.http.html": [
+ "fcfb36be0782b1832cb51045f508f6788164d7fb",
"testharness"
],
- "referrer-policy/origin/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html": [
- "57d8f47d4f2e209aed09cdfd190e16f3f4dc3545",
+ "referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-http.keep-origin.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
+ "support"
+ ],
+ "referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-http.no-redirect.http.html": [
+ "c5f506163b0cee181e8f188a1b59b56acb426c5a",
"testharness"
],
- "referrer-policy/origin/meta-referrer/same-origin/http-https/fetch-request/no-redirect/generic.http.html": [
- "47870a7628e68b29653fcad2826a4a4e1f9e2366",
+ "referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-http.no-redirect.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
+ "support"
+ ],
+ "referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-http.swap-origin.http.html": [
+ "e42ec7f173cca267da82d8c62b63eca194ea5104",
"testharness"
],
- "referrer-policy/origin/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html": [
- "3d1253229e3ce2a12c25e9a6bfd0ea8c32b4a960",
+ "referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-http.swap-origin.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
+ "support"
+ ],
+ "referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-https.keep-origin.http.html": [
+ "bc459e949d269a16c92a13ef474105d54aa6c679",
"testharness"
],
- "referrer-policy/origin/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html": [
- "8c0a1ec4eb7e1d4e73cc9248b3a5295c6aee2320",
+ "referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-https.keep-origin.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
+ "support"
+ ],
+ "referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-https.no-redirect.http.html": [
+ "35179b3793e3e109db1c65e8f4d004bc44e6a617",
"testharness"
],
- "referrer-policy/origin/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/generic.http.html": [
- "eaf45d6f7a56b805933575a89796fbaee236a10b",
+ "referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-https.no-redirect.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
+ "support"
+ ],
+ "referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-https.swap-origin.http.html": [
+ "6657261925bab5d47d867091aa9baab55895cbc4",
"testharness"
],
- "referrer-policy/origin/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html": [
- "9eaefdaf1ecb6a95d61a5d09b04813b1b4f10209",
+ "referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-https.swap-origin.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
+ "support"
+ ],
+ "referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-http.keep-origin.http.html": [
+ "1256c4229cb72422aea4e0375862e2a4a8995132",
"testharness"
],
- "referrer-policy/origin/meta-referrer/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html": [
- "bde05c454fdc270c6c58b9b26d61c96dd12f08cb",
+ "referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-http.keep-origin.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
+ "support"
+ ],
+ "referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-http.no-redirect.http.html": [
+ "7976130fb94e4bd1d3c1cd38cb6ac83085ba2b67",
"testharness"
],
- "referrer-policy/origin/meta-referrer/same-origin/http-https/img-tag/no-redirect/generic.http.html": [
- "7d723ab86a122870119fc6e46fbe8d6d64a1992d",
+ "referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-http.no-redirect.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
+ "support"
+ ],
+ "referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-http.swap-origin.http.html": [
+ "46fcbefebcb28c01d98b26974cb735925ede1bb2",
"testharness"
],
- "referrer-policy/origin/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html": [
- "e04b8253413a606b5913c532ac9c3934188310cf",
+ "referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-http.swap-origin.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
+ "support"
+ ],
+ "referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-https.keep-origin.http.html": [
+ "214285a9cc70e81fdab86b621813e8a85ae1e093",
"testharness"
],
- "referrer-policy/origin/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html": [
- "413e8ad82a1eefc6fd671a02db9ee4e52d872552",
+ "referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-https.keep-origin.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
+ "support"
+ ],
+ "referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-https.no-redirect.http.html": [
+ "861d55102675f26f9e9e8ef248dd09bf0a7daf48",
"testharness"
],
- "referrer-policy/origin/meta-referrer/same-origin/http-https/script-tag/no-redirect/generic.http.html": [
- "2832c088422ab0fc6154f4ef695698f0e879c948",
+ "referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-https.no-redirect.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
+ "support"
+ ],
+ "referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-https.swap-origin.http.html": [
+ "caff7fe9313ae1ed1b93e0631800df7592cd2455",
"testharness"
],
- "referrer-policy/origin/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html": [
- "78773bd5e7142ff4390bd686aec6cd21755246f6",
+ "referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-https.swap-origin.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
+ "support"
+ ],
+ "referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-http.keep-origin.http.html": [
+ "c050bef9faca254b6ce66f669026dfc6edb64ae9",
"testharness"
],
- "referrer-policy/origin/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html": [
- "3cd75589c30396db88d29dc11cb5abfe0ec7e43c",
+ "referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-http.keep-origin.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
+ "support"
+ ],
+ "referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-http.no-redirect.http.html": [
+ "7e9c5c2058250f2d4162d13d42572288ac11719d",
"testharness"
],
- "referrer-policy/origin/meta-referrer/same-origin/http-https/xhr-request/no-redirect/generic.http.html": [
- "cbccc42abdaa5a33189e9aa071e252e033f0a230",
+ "referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-http.no-redirect.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
+ "support"
+ ],
+ "referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-http.swap-origin.http.html": [
+ "949d6267406a33f951415277efd64f325769f3a6",
"testharness"
],
- "referrer-policy/origin/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html": [
- "ccd15b3bbfca4b0aae2817432949a042d535c599",
+ "referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-http.swap-origin.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
+ "support"
+ ],
+ "referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-https.keep-origin.http.html": [
+ "9544b914dda39deb973afa25e3e6143c406077c9",
"testharness"
],
- "referrer-policy/same-origin/attr-referrer/cross-origin/http-http/a-tag/no-redirect/cross-origin.http.html": [
- "7bcc2189a06b278e172ef18e25f2eb77a9080976",
+ "referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-https.keep-origin.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
+ "support"
+ ],
+ "referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-https.no-redirect.http.html": [
+ "12a3345a651067dd642429657a7e95d82885d1e5",
"testharness"
],
- "referrer-policy/same-origin/attr-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-origin.http.html": [
- "052a9df8e718bc7f5b1a536b542afeb9e77d2d1f",
+ "referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-https.no-redirect.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
+ "support"
+ ],
+ "referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-https.swap-origin.http.html": [
+ "da5ec0b4fcc3819bdf1527d5cf74462d3e833789",
"testharness"
],
- "referrer-policy/same-origin/attr-referrer/cross-origin/http-http/iframe-tag/no-redirect/cross-origin.http.html": [
- "92b1559f77a34faf3d2e27c3dbc9139bf6ac7594",
+ "referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-https.swap-origin.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
+ "support"
+ ],
+ "referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-http.keep-origin.http.html": [
+ "8f52a22b3c242343731fcf14732170b679e04f2e",
"testharness"
],
- "referrer-policy/same-origin/attr-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-origin.http.html": [
- "c047ae9b3d2391726700ede6082f3290ede16268",
+ "referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-http.keep-origin.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
+ "support"
+ ],
+ "referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-http.no-redirect.http.html": [
+ "c9c71a76d6b1988daeb0d6f2ffbc4ca9d24728ae",
"testharness"
],
- "referrer-policy/same-origin/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/cross-origin.http.html": [
- "a1e4d2d8adcdf6ce31d723674acb59768c59b6b1",
+ "referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-http.no-redirect.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
+ "support"
+ ],
+ "referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-http.swap-origin.http.html": [
+ "d6c7639e7d1061a42b69ac546697cf3cbd2226c9",
"testharness"
],
- "referrer-policy/same-origin/attr-referrer/cross-origin/http-http/img-tag/no-redirect/cross-origin.http.html": [
- "7a1fd76a93063b164e697d47a35d20c624d748bf",
+ "referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-http.swap-origin.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
+ "support"
+ ],
+ "referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-https.keep-origin.http.html": [
+ "0252877d323d1ca29a1d796c0048846b509a15d6",
"testharness"
],
- "referrer-policy/same-origin/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/cross-origin.http.html": [
- "9b7cf05f66e8942ea379a7bd1af05708db5ac555",
+ "referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-https.keep-origin.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
+ "support"
+ ],
+ "referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-https.no-redirect.http.html": [
+ "a17949475324a0d17341409caa2fb63418d60149",
"testharness"
],
- "referrer-policy/same-origin/attr-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/cross-origin.http.html": [
- "6c6bf43a24da351d73249c4938cf1022a3f058b6",
+ "referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-https.no-redirect.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
+ "support"
+ ],
+ "referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-https.swap-origin.http.html": [
+ "b88a6e8267fa44effde7dc4c37d10e58032bd9ac",
"testharness"
],
- "referrer-policy/same-origin/attr-referrer/cross-origin/http-http/script-tag/no-redirect/cross-origin.http.html": [
- "adbecffb5055ad8b9601fb43131ff2ca18c3c41f",
+ "referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-https.swap-origin.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
+ "support"
+ ],
+ "referrer-policy/gen/top.http-rp/strict-origin/sharedworker-classic/same-http.keep-origin.http.html": [
+ "0164b064debca7bf1b46f114824229418c78298e",
"testharness"
],
- "referrer-policy/same-origin/attr-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/cross-origin.http.html": [
- "a0942713fda3f86974fed9cfb2e0ae32f985b0eb",
+ "referrer-policy/gen/top.http-rp/strict-origin/sharedworker-classic/same-http.keep-origin.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
+ "support"
+ ],
+ "referrer-policy/gen/top.http-rp/strict-origin/sharedworker-classic/same-http.no-redirect.http.html": [
+ "289fc670546fc19b5718e4c9177ab1bc4c09fddc",
"testharness"
],
- "referrer-policy/same-origin/attr-referrer/cross-origin/http-https/a-tag/no-redirect/cross-origin.http.html": [
- "b37889b65b81ba6c2f236eab1f7a52764111298f",
+ "referrer-policy/gen/top.http-rp/strict-origin/sharedworker-classic/same-http.no-redirect.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
+ "support"
+ ],
+ "referrer-policy/gen/top.http-rp/strict-origin/worker-classic/same-http.keep-origin.http.html": [
+ "7561b4a088241bd2e91e1294691885e6956735b4",
"testharness"
],
- "referrer-policy/same-origin/attr-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/cross-origin.http.html": [
- "dad6e7ec9af0b8026a449559e4eb102f030d7afb",
+ "referrer-policy/gen/top.http-rp/strict-origin/worker-classic/same-http.keep-origin.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
+ "support"
+ ],
+ "referrer-policy/gen/top.http-rp/strict-origin/worker-classic/same-http.no-redirect.http.html": [
+ "2244a4cab6f1b0d2c5c7fce4ea21f6036b9936e2",
"testharness"
],
- "referrer-policy/same-origin/attr-referrer/cross-origin/http-https/iframe-tag/no-redirect/cross-origin.http.html": [
- "0e379e4312314b6ac9033b6077f3d8bbc92a6c04",
+ "referrer-policy/gen/top.http-rp/strict-origin/worker-classic/same-http.no-redirect.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
+ "support"
+ ],
+ "referrer-policy/gen/top.http-rp/strict-origin/worker-module/same-http.keep-origin.http.html": [
+ "4fa1f76fc9c7935bb079f1cc76903de1e1338c3c",
"testharness"
],
- "referrer-policy/same-origin/attr-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/cross-origin.http.html": [
- "1f7a8985a9eaf9c63aefbc1a94eb77692dc33af7",
+ "referrer-policy/gen/top.http-rp/strict-origin/worker-module/same-http.keep-origin.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
+ "support"
+ ],
+ "referrer-policy/gen/top.http-rp/strict-origin/worker-module/same-http.no-redirect.http.html": [
+ "f1f946f6df1318fe48edd0508b6ff25910f722b2",
"testharness"
],
- "referrer-policy/same-origin/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/cross-origin.http.html": [
- "2cbb6fd3489a6fb1610d396d1cd84b6cd39b5e3c",
+ "referrer-policy/gen/top.http-rp/strict-origin/worker-module/same-http.no-redirect.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
+ "support"
+ ],
+ "referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-http.keep-origin.http.html": [
+ "62b1d9fcfff140aa81af881c685225c7fa290076",
"testharness"
],
- "referrer-policy/same-origin/attr-referrer/cross-origin/http-https/img-tag/no-redirect/cross-origin.http.html": [
- "289aa3faacd62c4a5b7664224f239a77ea217852",
+ "referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-http.keep-origin.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
+ "support"
+ ],
+ "referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-http.no-redirect.http.html": [
+ "70fb9f9b1a2c152d57d263177ffd99948587dd99",
"testharness"
],
- "referrer-policy/same-origin/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/cross-origin.http.html": [
- "eaa417eca087df663bd992d9fa5681f3c725ecb1",
+ "referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-http.no-redirect.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
+ "support"
+ ],
+ "referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-http.swap-origin.http.html": [
+ "7fa069a3df4ffc7b57a4a30779ba80138bdd083c",
"testharness"
],
- "referrer-policy/same-origin/attr-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/cross-origin.http.html": [
- "2d2c6d6d04bb77176f33a658f02d83931181bc1f",
+ "referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-http.swap-origin.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
+ "support"
+ ],
+ "referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-https.keep-origin.http.html": [
+ "443e5e99ebd82c754c73d853b236664415efc073",
"testharness"
],
- "referrer-policy/same-origin/attr-referrer/cross-origin/http-https/script-tag/no-redirect/cross-origin.http.html": [
- "7e99eba7a8c0de14a5319861eb19e4bf051e5ff0",
+ "referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-https.keep-origin.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
+ "support"
+ ],
+ "referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-https.no-redirect.http.html": [
+ "946ef6f0d6e55b4cf0200976a70651058248bf36",
"testharness"
],
- "referrer-policy/same-origin/attr-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/cross-origin.http.html": [
- "a294cba7c53bd8b21f22bcf72265ca21735e652e",
+ "referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-https.no-redirect.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
+ "support"
+ ],
+ "referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-https.swap-origin.http.html": [
+ "24165be327592733572e6dc6d0bc99c641cbdb56",
"testharness"
],
- "referrer-policy/same-origin/attr-referrer/same-origin/http-http/a-tag/no-redirect/same-origin-insecure.http.html": [
- "0f0f3f586c7061c81392fdbfbb0614a9a564c7d9",
+ "referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-https.swap-origin.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
+ "support"
+ ],
+ "referrer-policy/gen/top.http-rp/strict-origin/xhr/same-http.keep-origin.http.html": [
+ "46f49d813cc74c896f729be42da32b9c005e15de",
"testharness"
],
- "referrer-policy/same-origin/attr-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/same-origin-insecure.http.html": [
- "29598521aae474ad8e0249e77f8c5ef35e122954",
+ "referrer-policy/gen/top.http-rp/strict-origin/xhr/same-http.keep-origin.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
+ "support"
+ ],
+ "referrer-policy/gen/top.http-rp/strict-origin/xhr/same-http.no-redirect.http.html": [
+ "5d6ae0ab3a61b379eb184111b8dda579051508f2",
"testharness"
],
- "referrer-policy/same-origin/attr-referrer/same-origin/http-http/iframe-tag/no-redirect/same-origin-insecure.http.html": [
- "03618c360eb2ea6a16bdd000f81352ac06f4f8df",
+ "referrer-policy/gen/top.http-rp/strict-origin/xhr/same-http.no-redirect.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
+ "support"
+ ],
+ "referrer-policy/gen/top.http-rp/strict-origin/xhr/same-http.swap-origin.http.html": [
+ "c0f820760219b1afe18214e0906d2f11f31a0f59",
"testharness"
],
- "referrer-policy/same-origin/attr-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html": [
- "1e785d961ab5f83fa3cdaf6bb1d8096599e4c848",
+ "referrer-policy/gen/top.http-rp/strict-origin/xhr/same-http.swap-origin.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
+ "support"
+ ],
+ "referrer-policy/gen/top.http-rp/strict-origin/xhr/same-https.keep-origin.http.html": [
+ "ac0c3e71bbf2f205cff785c54e7499f28c7fa899",
"testharness"
],
- "referrer-policy/same-origin/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/same-origin-insecure.http.html": [
- "4e046873b80698f0686963ffd19a4a5df3063677",
+ "referrer-policy/gen/top.http-rp/strict-origin/xhr/same-https.keep-origin.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
+ "support"
+ ],
+ "referrer-policy/gen/top.http-rp/strict-origin/xhr/same-https.no-redirect.http.html": [
+ "83ad4b6291261e2f4f7386a9d0e2b936a0844522",
"testharness"
],
- "referrer-policy/same-origin/attr-referrer/same-origin/http-http/img-tag/no-redirect/same-origin-insecure.http.html": [
- "c61e82351abae662c02d9f815581ef965395de0b",
+ "referrer-policy/gen/top.http-rp/strict-origin/xhr/same-https.no-redirect.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
+ "support"
+ ],
+ "referrer-policy/gen/top.http-rp/strict-origin/xhr/same-https.swap-origin.http.html": [
+ "92157004fac32b0135b4cea4c6a9f7bec2674747",
"testharness"
],
- "referrer-policy/same-origin/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/same-origin-insecure.http.html": [
- "96fc319aeeb771d19f522f2056cc07424fa0de56",
+ "referrer-policy/gen/top.http-rp/strict-origin/xhr/same-https.swap-origin.http.html.headers": [
+ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130",
+ "support"
+ ],
+ "referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html": [
+ "46f755716fbbe8abe1eafb384de782154f034f0f",
"testharness"
],
- "referrer-policy/same-origin/attr-referrer/same-origin/http-http/script-tag/keep-origin-redirect/same-origin-insecure.http.html": [
- "1e54e3910e47c0519b5d9300187ca6bfeebe42e2",
+ "referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
+ "support"
+ ],
+ "referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html": [
+ "ea92aa8bb903fd8a08bdb2a13321fde5a089c9e2",
"testharness"
],
- "referrer-policy/same-origin/attr-referrer/same-origin/http-http/script-tag/no-redirect/same-origin-insecure.http.html": [
- "a67da15008442cdfdddc04b50b85fa45eda5ee2d",
+ "referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
+ "support"
+ ],
+ "referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html": [
+ "81b93dbc33565034b4588fcea887cd96ca6552e1",
"testharness"
],
- "referrer-policy/same-origin/attr-referrer/same-origin/http-http/script-tag/swap-origin-redirect/same-origin-insecure.http.html": [
- "b5c0081ef670b30fab9000c250f5747155867d4a",
+ "referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
+ "support"
+ ],
+ "referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html": [
+ "8f83d836372e744d20890ab1681f4f741fd55b37",
"testharness"
],
- "referrer-policy/same-origin/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html": [
- "9aeeff94ea29d6e9e3f4831f2e5ed2dd5b31cb05",
+ "referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
+ "support"
+ ],
+ "referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html": [
+ "652544ef076195e5c728560dd206d8367b9142c6",
"testharness"
],
- "referrer-policy/same-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html": [
- "0b75d68887554411a66fd7a729fac2a6fbc34b20",
+ "referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
+ "support"
+ ],
+ "referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html": [
+ "501473cb7d16df2f922c2fec982bf52ff58f0e37",
"testharness"
],
- "referrer-policy/same-origin/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html": [
- "2be11cbd75b1c632d25aef91215d435d53a775a6",
+ "referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
+ "support"
+ ],
+ "referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html": [
+ "a4ab8302d9a3031740dd79f1b80854003bc62a56",
"testharness"
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/a-tag/no-redirect/cross-origin.http.html": [
- "5923bd66f218c216f82ec0c8686e4063d6dee687",
+ "referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
+ "support"
+ ],
+ "referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html": [
+ "f4446f7c759319a8310126a7f87812476aa83998",
"testharness"
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/a-tag/no-redirect/cross-origin.http.html.headers": [
- "309da8091a927735fec71fbd4af9acb39eb3a964",
+ "referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/cross-origin.http.html": [
- "cca4a0ceb6e239d7cd3e2d7954d3753a8d519ec7",
+ "referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html": [
+ "32f80b9210ec7cfbd053c3a9a17cd218015bb3eb",
"testharness"
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/cross-origin.http.html.headers": [
- "309da8091a927735fec71fbd4af9acb39eb3a964",
+ "referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/no-redirect/cross-origin.http.html": [
- "8bf793b5b86006bed7f85160039315c922e11883",
+ "referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html": [
+ "ff6aafe80dc284585466681530644825b3dd5752",
"testharness"
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/no-redirect/cross-origin.http.html.headers": [
- "309da8091a927735fec71fbd4af9acb39eb3a964",
+ "referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/cross-origin.http.html": [
- "7c0a9b9bc6068ba1366b4ece8f691ac85b472852",
+ "referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html": [
+ "5b4309f61bc1a0257189a63940d4c9123c5a659a",
"testharness"
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/cross-origin.http.html.headers": [
- "309da8091a927735fec71fbd4af9acb39eb3a964",
+ "referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-origin.http.html": [
- "9c2b85af9b33c526f7ef12e6fc73085f544e708a",
+ "referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html": [
+ "dbf8920ceb0078725000c95320af9297c6d90dd5",
"testharness"
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-origin.http.html.headers": [
- "309da8091a927735fec71fbd4af9acb39eb3a964",
+ "referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/no-redirect/cross-origin.http.html": [
- "96bc005ebf9ff3e96427c6f963c64abc2fd04942",
+ "referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html": [
+ "e184f2f99d02617291a8c2d440eb1938d2b04861",
"testharness"
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/no-redirect/cross-origin.http.html.headers": [
- "309da8091a927735fec71fbd4af9acb39eb3a964",
+ "referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-origin.http.html": [
- "4e35615bf1b6952b9141491d2dbe4da721644416",
+ "referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html": [
+ "e713b614473b202e0444b2a8a6af0f0a1f216b27",
"testharness"
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-origin.http.html.headers": [
- "309da8091a927735fec71fbd4af9acb39eb3a964",
+ "referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/cross-origin.http.html": [
- "b78a720df6887c563b3188bfb4388efab3cb6d06",
+ "referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html": [
+ "efcacb80db58462ab3291be1f8bdde1cc4cdacdc",
"testharness"
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/cross-origin.http.html.headers": [
- "309da8091a927735fec71fbd4af9acb39eb3a964",
+ "referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/no-redirect/cross-origin.http.html": [
- "7d5905ba238960efdbaa054d3051b2ba8dbb801b",
+ "referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html": [
+ "0e0ad8762584cb5cf490949d858fc642d3a79eb0",
"testharness"
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/no-redirect/cross-origin.http.html.headers": [
- "309da8091a927735fec71fbd4af9acb39eb3a964",
+ "referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/cross-origin.http.html": [
- "5a8e1fd812c811fdcad799c061edee418e4f4c22",
+ "referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html": [
+ "7aa58b40dd9d99a758da491d177c4c57880b1204",
"testharness"
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/cross-origin.http.html.headers": [
- "309da8091a927735fec71fbd4af9acb39eb3a964",
+ "referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/cross-origin.http.html": [
- "f4a53c631d569bb8ff9cd19e76734fb0dd0d6dc5",
+ "referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html": [
+ "96940d924c513af36572212c85568888ed7c5d27",
"testharness"
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/cross-origin.http.html.headers": [
- "309da8091a927735fec71fbd4af9acb39eb3a964",
+ "referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/no-redirect/cross-origin.http.html": [
- "d6b14df479501a13286d725e8c2527d6438161c9",
+ "referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html": [
+ "826f0129e497f916ff8fb4ed62ee4ad49f6cea5b",
"testharness"
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/no-redirect/cross-origin.http.html.headers": [
- "309da8091a927735fec71fbd4af9acb39eb3a964",
+ "referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/cross-origin.http.html": [
- "b5daa974365c947fdf7570cb5213acb3b8026e4d",
+ "referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html": [
+ "ff42df4b3c1e886ff76b6eebdad145caef406d3e",
"testharness"
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/cross-origin.http.html.headers": [
- "309da8091a927735fec71fbd4af9acb39eb3a964",
+ "referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/cross-origin.http.html": [
- "7fdc05de8d66e4a922be27882866f898bfaa8242",
+ "referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html": [
+ "abd462ee755b5752e21a1c61101d0952a31599cf",
"testharness"
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/cross-origin.http.html.headers": [
- "309da8091a927735fec71fbd4af9acb39eb3a964",
+ "referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/no-redirect/cross-origin.http.html": [
- "c5b705bef4b911a755e57895387973ea94a83834",
+ "referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html": [
+ "141ccdb31ae083a244a22ddcb3a75024f03e20a4",
"testharness"
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/no-redirect/cross-origin.http.html.headers": [
- "309da8091a927735fec71fbd4af9acb39eb3a964",
+ "referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/cross-origin.http.html": [
- "926ed948d513198bbfaa4566f138608def79ea12",
+ "referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html": [
+ "b322ae35886009dc743cff902620522f4814c0c6",
"testharness"
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/cross-origin.http.html.headers": [
- "309da8091a927735fec71fbd4af9acb39eb3a964",
+ "referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/a-tag/no-redirect/cross-origin.http.html": [
- "0bb7ff22833d0673710f999f25f1900524bdb938",
+ "referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html": [
+ "1cafbbc10b4f952cd1b948ac3f90019c53ee38e2",
"testharness"
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/a-tag/no-redirect/cross-origin.http.html.headers": [
- "309da8091a927735fec71fbd4af9acb39eb3a964",
+ "referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/cross-origin.http.html": [
- "b1d5c24fdadaf54f4271387436ab4b928598964f",
+ "referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html": [
+ "d8beb3587aded8df07c1a2140795392f7178848c",
"testharness"
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/cross-origin.http.html.headers": [
- "309da8091a927735fec71fbd4af9acb39eb3a964",
+ "referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/no-redirect/cross-origin.http.html": [
- "29efe5be1eb4df6ce64d5bb581c5d12a69e0d6b9",
+ "referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html": [
+ "d70214a0bbc31780d69fa35ca016c938728de45c",
"testharness"
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/no-redirect/cross-origin.http.html.headers": [
- "309da8091a927735fec71fbd4af9acb39eb3a964",
+ "referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/cross-origin.http.html": [
- "79b406bb6ef98946c2464a17fc5c5e53d763d5ef",
+ "referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html": [
+ "8f93cee247226f5fbc592171fcbc830a014da52c",
"testharness"
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/cross-origin.http.html.headers": [
- "309da8091a927735fec71fbd4af9acb39eb3a964",
+ "referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/cross-origin.http.html": [
- "553334e038b15e87bb3695105ed781df416b40a6",
+ "referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html": [
+ "fe438d62a8b8dd39d617caaada0968488b890ed2",
"testharness"
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/cross-origin.http.html.headers": [
- "309da8091a927735fec71fbd4af9acb39eb3a964",
+ "referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/no-redirect/cross-origin.http.html": [
- "c23a6cdf19891d86c0737d79e2615ade91828170",
+ "referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html": [
+ "aa3d84b0d724ed45cd3869ab15e658b1cd1a4c5e",
"testharness"
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/no-redirect/cross-origin.http.html.headers": [
- "309da8091a927735fec71fbd4af9acb39eb3a964",
+ "referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/cross-origin.http.html": [
- "7dbb28b150ef87904030e004b7f29cbb95abb686",
+ "referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html": [
+ "5b7a08d20b0fd84f84c0e73c39b66986c3f7667f",
"testharness"
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/cross-origin.http.html.headers": [
- "309da8091a927735fec71fbd4af9acb39eb3a964",
+ "referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/cross-origin.http.html": [
- "0f8c2d41b9adb19b22c94891c6a94ca650485a6e",
+ "referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html": [
+ "aedc3236108a76de12dafbf54fa0f3e5309dd2dd",
"testharness"
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/cross-origin.http.html.headers": [
- "309da8091a927735fec71fbd4af9acb39eb3a964",
+ "referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/no-redirect/cross-origin.http.html": [
- "85236c6263d051ea673de4a8707ae55f930817d3",
+ "referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html": [
+ "ec1ff22f3be5e11c3872b52c73d2b26b2cc32f89",
"testharness"
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/no-redirect/cross-origin.http.html.headers": [
- "309da8091a927735fec71fbd4af9acb39eb3a964",
+ "referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/cross-origin.http.html": [
- "26767fab0b35cc69088350e4361791521b1b495b",
+ "referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html": [
+ "632a02bf290355919349044782402157e451f77d",
"testharness"
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/cross-origin.http.html.headers": [
- "309da8091a927735fec71fbd4af9acb39eb3a964",
+ "referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/cross-origin.http.html": [
- "2c98ba5babf4afdf68e5504520aa4c1735ea8ba9",
+ "referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html": [
+ "16ae57857d5a49a41c7d53a74e575df41b64de30",
"testharness"
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/cross-origin.http.html.headers": [
- "309da8091a927735fec71fbd4af9acb39eb3a964",
+ "referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/no-redirect/cross-origin.http.html": [
- "3a4e85ec7e6ecd582a1426d11cb82ad407b76963",
+ "referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html": [
+ "10b36291cf7653e19de4d495c88ac6e5a5ad2e08",
"testharness"
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/no-redirect/cross-origin.http.html.headers": [
- "309da8091a927735fec71fbd4af9acb39eb3a964",
+ "referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/cross-origin.http.html": [
- "7b0b455205756aa3b465687a5ecf3008fa62fa5f",
+ "referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html": [
+ "4b3b746577ee29dd62a37e0edce8543a6cf8796a",
"testharness"
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/cross-origin.http.html.headers": [
- "309da8091a927735fec71fbd4af9acb39eb3a964",
+ "referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/cross-origin.http.html": [
- "274f04abe69076599818e8bc01303576a74c87bc",
+ "referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html": [
+ "ae46fd10a2878947ee068ae21dbbc8de650a99c3",
"testharness"
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/cross-origin.http.html.headers": [
- "309da8091a927735fec71fbd4af9acb39eb3a964",
+ "referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/no-redirect/cross-origin.http.html": [
- "dc7dfebee0676cffcdc3b84d74bc9214eb58d247",
+ "referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html": [
+ "cceae990937075a35dd0f5584856c8eebb9f3187",
"testharness"
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/no-redirect/cross-origin.http.html.headers": [
- "309da8091a927735fec71fbd4af9acb39eb3a964",
+ "referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/cross-origin.http.html": [
- "b2d25b69e3069ef9a4ae29430d06c99157606c7b",
+ "referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html": [
+ "9730c086bb411cca9f8837cd83fa13099da50db7",
"testharness"
],
- "referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/cross-origin.http.html.headers": [
- "309da8091a927735fec71fbd4af9acb39eb3a964",
+ "referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/a-tag/no-redirect/same-origin-insecure.http.html": [
- "86ad248198ca36421a965986090a3eb47f15a1fd",
+ "referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html": [
+ "edb2870fd2a555d092e756c2549bb7b212241a96",
"testharness"
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/a-tag/no-redirect/same-origin-insecure.http.html.headers": [
- "309da8091a927735fec71fbd4af9acb39eb3a964",
+ "referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/same-origin-insecure.http.html": [
- "622f77bde2d799a23c99d41615c7b932a163b57a",
+ "referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html": [
+ "85bcee0592415e6ed0be5a3eb67e0770896841d4",
"testharness"
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/same-origin-insecure.http.html.headers": [
- "309da8091a927735fec71fbd4af9acb39eb3a964",
+ "referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/no-redirect/same-origin-insecure.http.html": [
- "dab704a425dbf18c4bc7a5c45668887f4bd3fa34",
+ "referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html": [
+ "cbe536dad6b3b32dfe4c0df209d1b40a7a3cf783",
"testharness"
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/no-redirect/same-origin-insecure.http.html.headers": [
- "309da8091a927735fec71fbd4af9acb39eb3a964",
+ "referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/same-origin-insecure.http.html": [
- "878d948ceb3d0a2decd663a5da49d03751c1d6be",
+ "referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html": [
+ "f0020630ccb223e184e81cc057b9da28d2253dc9",
"testharness"
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/same-origin-insecure.http.html.headers": [
- "309da8091a927735fec71fbd4af9acb39eb3a964",
+ "referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/same-origin-insecure.http.html": [
- "603ecc5577953c60dca3e4151737868c9b7eba13",
+ "referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html": [
+ "632083161f0b30cdfc9d74369df3c1d7232d8b82",
"testharness"
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/same-origin-insecure.http.html.headers": [
- "309da8091a927735fec71fbd4af9acb39eb3a964",
+ "referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/no-redirect/same-origin-insecure.http.html": [
- "43a132e68087bd38bc09b35b1d135064fcc590d7",
+ "referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html": [
+ "857b3cc3b11780ad6a260bb4795aa57c11570e31",
"testharness"
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/no-redirect/same-origin-insecure.http.html.headers": [
- "309da8091a927735fec71fbd4af9acb39eb3a964",
+ "referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html": [
- "1bd76067b274b0cc8e0bd7a8e7bace26ebe645cc",
+ "referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html": [
+ "27a0f12923707b3b19a04dbbd1181c1e46c14440",
"testharness"
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html.headers": [
- "309da8091a927735fec71fbd4af9acb39eb3a964",
+ "referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/same-origin-insecure.http.html": [
- "d00194b14373fddf919b705e8f368a21c7251355",
+ "referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html": [
+ "bb7bd17c07624ae7fd99bf77ae65960619891b4b",
"testharness"
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/same-origin-insecure.http.html.headers": [
- "309da8091a927735fec71fbd4af9acb39eb3a964",
+ "referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/no-redirect/same-origin-insecure.http.html": [
- "2daad6708671e79dd0d13afd5ff82fd96a55e8ab",
+ "referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html": [
+ "3e38bae9f2bf0f1293f47c394f8e95aba0ab0eac",
"testharness"
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/no-redirect/same-origin-insecure.http.html.headers": [
- "309da8091a927735fec71fbd4af9acb39eb3a964",
+ "referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/same-origin-insecure.http.html": [
- "1cda061aa01ea3346583e87fdc1d4ee7d1a04512",
+ "referrer-policy/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html": [
+ "4783f45ac9df5065f36ca61fa5933e79f17cec67",
"testharness"
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/same-origin-insecure.http.html.headers": [
- "309da8091a927735fec71fbd4af9acb39eb3a964",
+ "referrer-policy/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/same-origin-insecure.http.html": [
- "735a4acbdf653c4ac67dfe2ad4fc5880719f45ba",
+ "referrer-policy/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html": [
+ "f2f186cdfda91a00f14e3a564047ce6cf0e45b44",
"testharness"
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/same-origin-insecure.http.html.headers": [
- "309da8091a927735fec71fbd4af9acb39eb3a964",
+ "referrer-policy/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/module-worker/no-redirect/same-origin-insecure.http.html": [
- "19e5416cb3fb454a564da05e0cb319a2e784349e",
+ "referrer-policy/gen/top.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html": [
+ "08a9996882fbedcbcd9b4b8f5c48cfd72fc622fa",
"testharness"
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/module-worker/no-redirect/same-origin-insecure.http.html.headers": [
- "309da8091a927735fec71fbd4af9acb39eb3a964",
+ "referrer-policy/gen/top.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/same-origin-insecure.http.html": [
- "e45cbc673aef1a9547b28ba239218a1d742656a7",
+ "referrer-policy/gen/top.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html": [
+ "4230c620d52664df2494f74ebf2efa939ab1eeb3",
"testharness"
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/same-origin-insecure.http.html.headers": [
- "309da8091a927735fec71fbd4af9acb39eb3a964",
+ "referrer-policy/gen/top.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/no-redirect/same-origin-insecure.http.html": [
- "4539d076c498b5c2a385d60d2af98fd605d75d80",
+ "referrer-policy/gen/top.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html": [
+ "94f6837bc9dca4d5439f12f4839fb33e486fdae9",
"testharness"
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/no-redirect/same-origin-insecure.http.html.headers": [
- "309da8091a927735fec71fbd4af9acb39eb3a964",
+ "referrer-policy/gen/top.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/same-origin-insecure.http.html": [
- "7f3e435f11a75749272ee2e89bef15edc5b6119a",
+ "referrer-policy/gen/top.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html": [
+ "3c533839f64b6b707c01d6e1485422211066d2fa",
"testharness"
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/same-origin-insecure.http.html.headers": [
- "309da8091a927735fec71fbd4af9acb39eb3a964",
+ "referrer-policy/gen/top.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/same-origin-insecure.http.html": [
- "81607785f9aecee0c333472d6e5ebcdef4cee98f",
+ "referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html": [
+ "b97e5c6999140d5ba25d63c2e69d0a5251b9b235",
"testharness"
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/same-origin-insecure.http.html.headers": [
- "309da8091a927735fec71fbd4af9acb39eb3a964",
+ "referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/shared-worker/no-redirect/same-origin-insecure.http.html": [
- "a8a6aa1d8284cfaca4adddee4eb33db1b4dc0a8f",
+ "referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html": [
+ "3de9921101b1c4d500d27fc24978d79cba10be97",
"testharness"
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/shared-worker/no-redirect/same-origin-insecure.http.html.headers": [
- "309da8091a927735fec71fbd4af9acb39eb3a964",
+ "referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/same-origin-insecure.http.html": [
- "f1eba7aacdc8b8a3d3d15a7e49f8dbddba81136c",
+ "referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html": [
+ "4a927af2bb0e50790bf658bf54753ab3a6907aa8",
"testharness"
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/same-origin-insecure.http.html.headers": [
- "309da8091a927735fec71fbd4af9acb39eb3a964",
+ "referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/worker-request/no-redirect/same-origin-insecure.http.html": [
- "7ab0933178534647189dad28aed2b0ae1e59e304",
+ "referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html": [
+ "c90180a3a07dd0264ff84421b728295666794ce4",
"testharness"
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/worker-request/no-redirect/same-origin-insecure.http.html.headers": [
- "309da8091a927735fec71fbd4af9acb39eb3a964",
+ "referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/same-origin-insecure.http.html": [
- "29ba286e378d9520e58b8f457ef792f1415edaa9",
+ "referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html": [
+ "6c5cd5d0323b881e4aedf1d35bee02e82b42f36b",
"testharness"
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/same-origin-insecure.http.html.headers": [
- "309da8091a927735fec71fbd4af9acb39eb3a964",
+ "referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/no-redirect/same-origin-insecure.http.html": [
- "0d1b267039a1275bbd030fd83409c3ee4dc56246",
+ "referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html": [
+ "433913e65b10b58ecd131174fd844f088e47933c",
"testharness"
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/no-redirect/same-origin-insecure.http.html.headers": [
- "309da8091a927735fec71fbd4af9acb39eb3a964",
+ "referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/same-origin-insecure.http.html": [
- "dd07624a9990c8ee9a6bd51805fe3c3956dd087f",
+ "referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html": [
+ "82d546f303054b873f782f46fff45976e64477e5",
"testharness"
],
- "referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/same-origin-insecure.http.html.headers": [
- "309da8091a927735fec71fbd4af9acb39eb3a964",
+ "referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/same-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-insecure.http.html": [
- "38df795e3a527273e8dd842a430bfe6f6a2fc797",
+ "referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html": [
+ "76dfb9bcc00e473494401539f5317aafd948c966",
"testharness"
],
- "referrer-policy/same-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-insecure.http.html.headers": [
- "309da8091a927735fec71fbd4af9acb39eb3a964",
+ "referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/same-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html": [
- "525df39fd4b9d10cc94602f39458bbe5447a10f8",
+ "referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html": [
+ "cd9a26e1a25770932673091e54f75043742facac",
"testharness"
],
- "referrer-policy/same-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html.headers": [
- "309da8091a927735fec71fbd4af9acb39eb3a964",
+ "referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/same-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html": [
- "a4533c649aebba3bedbfaea508e8db106e2be24e",
+ "referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html": [
+ "8a345aab4f522a7a93b97567fe91a963adc04f18",
"testharness"
],
- "referrer-policy/same-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html.headers": [
- "309da8091a927735fec71fbd4af9acb39eb3a964",
+ "referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/same-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html": [
- "037bb3fee4621ec2560464927938994a067ab1f9",
+ "referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html": [
+ "770b6be72abdbb4767d4cced8409974bddf481c5",
"testharness"
],
- "referrer-policy/same-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html.headers": [
- "309da8091a927735fec71fbd4af9acb39eb3a964",
+ "referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/same-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-insecure.http.html": [
- "7671fa5c539724e4b3f062ff2d09c68fb692bf8b",
+ "referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html": [
+ "557c897f6dcf731b9dcb6f6df25096a4ff67f73c",
"testharness"
],
- "referrer-policy/same-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-insecure.http.html.headers": [
- "309da8091a927735fec71fbd4af9acb39eb3a964",
+ "referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html.headers": [
+ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286",
"support"
],
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-http/a-tag/no-redirect/cross-origin.http.html": [
- "ed415758d0660d20a35d45453241c50539c3f95a",
+ "referrer-policy/gen/top.http-rp/unset/fetch/cross-http.keep-origin.http.html": [
+ "ea2e8d1194859594c01f573e3f3ce5818566a9cf",
"testharness"
],
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-http/fetch-request/keep-origin-redirect/cross-origin.http.html": [
- "085a267a574315c3ef79201716645cce9e05e446",
+ "referrer-policy/gen/top.http-rp/unset/fetch/cross-http.no-redirect.http.html": [
+ "2cfe2a0fb99b9b83770be5ea0347887437cab561",
"testharness"
],
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-http/fetch-request/no-redirect/cross-origin.http.html": [
- "cc554724b309b41326ade1d96358ef07aab875bc",
+ "referrer-policy/gen/top.http-rp/unset/fetch/cross-http.swap-origin.http.html": [
+ "44501a5f736380a6c6a3e879bddfbf8aa6f4f90f",
"testharness"
],
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-http/fetch-request/swap-origin-redirect/cross-origin.http.html": [
- "011ffcd01eb6882a4c2ef216bc76d921fc01b164",
+ "referrer-policy/gen/top.http-rp/unset/fetch/cross-https.keep-origin.http.html": [
+ "9f51a70045663262f724914650eeb93b92551a7d",
"testharness"
],
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-origin.http.html": [
- "3f7d38759e9164c4702b3315fda85c6bee66fa37",
+ "referrer-policy/gen/top.http-rp/unset/fetch/cross-https.no-redirect.http.html": [
+ "b16692f66d4ad8094cff6c778242afaf819cedc5",
"testharness"
],
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-http/iframe-tag/no-redirect/cross-origin.http.html": [
- "f66e36d7a9b2ed7dfc98bf305265296c0b54ea0e",
+ "referrer-policy/gen/top.http-rp/unset/fetch/cross-https.swap-origin.http.html": [
+ "532809dd0afa8fa7cf20e93572ffe3068482a768",
"testharness"
],
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-origin.http.html": [
- "e10c1066d6407de1e28dc2b7ec974f348ca2021d",
+ "referrer-policy/gen/top.http-rp/unset/fetch/same-http.keep-origin.http.html": [
+ "99882a623ccd727407e4fadb666994f615afb93b",
"testharness"
],
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/cross-origin.http.html": [
- "b3424b1ea90df159ac4357acdf1912aa7836db10",
+ "referrer-policy/gen/top.http-rp/unset/fetch/same-http.no-redirect.http.html": [
+ "aae08809fa202d2d0dafd7fb8b11802f56b14dab",
"testharness"
],
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-http/img-tag/no-redirect/cross-origin.http.html": [
- "40c2b7a9ff80538e4597efcfe68206419d4550cf",
+ "referrer-policy/gen/top.http-rp/unset/fetch/same-http.swap-origin.http.html": [
+ "b8dbbd6e029ff40110d6d30bfd013201edea9b6f",
"testharness"
],
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/cross-origin.http.html": [
- "13b9d94f53e651983f0c98f1368712ac686f8b94",
+ "referrer-policy/gen/top.http-rp/unset/fetch/same-https.keep-origin.http.html": [
+ "5480d46ff3f05aa804e2386c755d0afe3fd2ee49",
"testharness"
],
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/cross-origin.http.html": [
- "e50f65e16b9ffd7cecf8e9e1046a39cee5d44641",
+ "referrer-policy/gen/top.http-rp/unset/fetch/same-https.no-redirect.http.html": [
+ "0edaa41c1c8237df53d6c4e2cfe3654aa0b36d2b",
"testharness"
],
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-http/script-tag/no-redirect/cross-origin.http.html": [
- "5b5dd12e5968a6e331c92b17560907ede8af86d6",
+ "referrer-policy/gen/top.http-rp/unset/fetch/same-https.swap-origin.http.html": [
+ "2bcb3cbe6ec3e8f8102f8a5eb4e4a92e53f91476",
"testharness"
],
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/cross-origin.http.html": [
- "ebc18c61cdcd34e600f6bacacc7ef5b664e447e7",
+ "referrer-policy/gen/top.http-rp/unset/iframe-tag/cross-http.keep-origin.http.html": [
+ "97ec687004a41a5aeb3d8d7d06c3a3e5a36db20b",
"testharness"
],
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-http/xhr-request/keep-origin-redirect/cross-origin.http.html": [
- "06becc108f4242a8a65c29e7ea96834c2fb335f2",
+ "referrer-policy/gen/top.http-rp/unset/iframe-tag/cross-http.no-redirect.http.html": [
+ "d631a6dcb12fcdac7bd6cac94b67893203ae805c",
"testharness"
],
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-http/xhr-request/no-redirect/cross-origin.http.html": [
- "88a7cddb0b0b45d0b9be0b76eef78920142bc69b",
+ "referrer-policy/gen/top.http-rp/unset/iframe-tag/cross-http.swap-origin.http.html": [
+ "2d627c6d22edd82ba71e776c85cd7ff9981f6db0",
"testharness"
],
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-http/xhr-request/swap-origin-redirect/cross-origin.http.html": [
- "ebd682842212eb437f3528ea9797fe4169b8e9ea",
+ "referrer-policy/gen/top.http-rp/unset/iframe-tag/cross-https.keep-origin.http.html": [
+ "366e8665a62e062ad5d44f079d0585d353a38d9b",
"testharness"
],
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-https/a-tag/no-redirect/cross-origin.http.html": [
- "b50c0b60db869878263019cd538f40b5c91be652",
+ "referrer-policy/gen/top.http-rp/unset/iframe-tag/cross-https.no-redirect.http.html": [
+ "3a55660c0e48d19afd0101e29b9b7b09013ba7b4",
"testharness"
],
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-https/fetch-request/keep-origin-redirect/cross-origin.http.html": [
- "df69d477669de463a732771d42ac960b23cee88d",
+ "referrer-policy/gen/top.http-rp/unset/iframe-tag/cross-https.swap-origin.http.html": [
+ "9b857831f09986428eea878ff03d33981788d4bb",
"testharness"
],
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-https/fetch-request/no-redirect/cross-origin.http.html": [
- "eda910d09224a34fd6691ad8d237aa776a0030d6",
+ "referrer-policy/gen/top.http-rp/unset/iframe-tag/same-http.keep-origin.http.html": [
+ "d80ff5a58075f7a0cd469da0d9ec0587172316cb",
"testharness"
],
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-https/fetch-request/swap-origin-redirect/cross-origin.http.html": [
- "37370379123733391ab56ab9ef5f17a7a906cb4a",
+ "referrer-policy/gen/top.http-rp/unset/iframe-tag/same-http.no-redirect.http.html": [
+ "012d095ef49377e0c7bf2ebc6e12efd8aed5dec4",
"testharness"
],
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/cross-origin.http.html": [
- "56e124b14703bf29e5939802eeabb40efebb92d5",
+ "referrer-policy/gen/top.http-rp/unset/iframe-tag/same-http.swap-origin.http.html": [
+ "f2f4595415a3c912da6fab0b144373651393c91f",
"testharness"
],
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-https/iframe-tag/no-redirect/cross-origin.http.html": [
- "2d1110639e0fbe8c391a9d8d7b98cbf1ce1fc8db",
+ "referrer-policy/gen/top.http-rp/unset/iframe-tag/same-https.keep-origin.http.html": [
+ "667567ebba11259e988613adc3a040269a927abd",
"testharness"
],
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/cross-origin.http.html": [
- "22fe64a09450148c529ffad93387de46e86c2e41",
+ "referrer-policy/gen/top.http-rp/unset/iframe-tag/same-https.no-redirect.http.html": [
+ "2824cead304141079f73bedaf9655ed5406d34c2",
"testharness"
],
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/cross-origin.http.html": [
- "2ae690c53d97c27f587fd4c7a2fc3fe959865e97",
+ "referrer-policy/gen/top.http-rp/unset/iframe-tag/same-https.swap-origin.http.html": [
+ "9efcc95c2aa98335f7613d6d2e53c2550defe471",
"testharness"
],
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-https/img-tag/no-redirect/cross-origin.http.html": [
- "b14908a7b2cb7fc4271cbe54566f074053e84ea0",
+ "referrer-policy/gen/top.http-rp/unset/img-tag/cross-http.keep-origin.http.html": [
+ "3d9206f18f101b20ceed0fa677ac5836b1db9c30",
"testharness"
],
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/cross-origin.http.html": [
- "485c8784c699bc4b8c93cb38a818965b1ff0e1e4",
+ "referrer-policy/gen/top.http-rp/unset/img-tag/cross-http.no-redirect.http.html": [
+ "6d5c1e56cb2cd0842d8ee456ce73b707edf196af",
"testharness"
],
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/cross-origin.http.html": [
- "f81dd12dc60735340ffebbbe952929e48d9e6c0e",
+ "referrer-policy/gen/top.http-rp/unset/img-tag/cross-http.swap-origin.http.html": [
+ "51596668d9399022071858d762337a0eafb9ddab",
"testharness"
],
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-https/script-tag/no-redirect/cross-origin.http.html": [
- "484d9ec036ff84737e8426fe3281c1c8a4f0fc29",
+ "referrer-policy/gen/top.http-rp/unset/img-tag/cross-https.keep-origin.http.html": [
+ "9cd2d1ffee576cf75f0fe9481a5f8697df675b7f",
"testharness"
],
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/cross-origin.http.html": [
- "e566233091f45603c48235541df2ba68233998f4",
+ "referrer-policy/gen/top.http-rp/unset/img-tag/cross-https.no-redirect.http.html": [
+ "4d71131d9b94a23961efa78f075787d7cdd0f432",
"testharness"
],
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-https/xhr-request/keep-origin-redirect/cross-origin.http.html": [
- "f68dac93582cd5e7d1815d6c367662a84a2cab03",
+ "referrer-policy/gen/top.http-rp/unset/img-tag/cross-https.swap-origin.http.html": [
+ "29a55b7627240b528710a4393bef43f131a676d1",
"testharness"
],
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-https/xhr-request/no-redirect/cross-origin.http.html": [
- "7ffc2824a8b83c7d0cdb99ba27e0d550e465d454",
+ "referrer-policy/gen/top.http-rp/unset/img-tag/same-http.keep-origin.http.html": [
+ "09f9e964f66baabe323a038841b971e35119468c",
"testharness"
],
- "referrer-policy/same-origin/meta-referrer/cross-origin/http-https/xhr-request/swap-origin-redirect/cross-origin.http.html": [
- "0834f026a39a6c328cb65a9e603d30196db8910f",
+ "referrer-policy/gen/top.http-rp/unset/img-tag/same-http.no-redirect.http.html": [
+ "ee69797376a02ae0c6d090dbbe516fb40048c482",
"testharness"
],
- "referrer-policy/same-origin/meta-referrer/same-origin/http-http/a-tag/no-redirect/same-origin-insecure.http.html": [
- "6f2de0eeff1a23b74ddc877eb405ffc125b62220",
+ "referrer-policy/gen/top.http-rp/unset/img-tag/same-http.swap-origin.http.html": [
+ "8b9f2909c649220a721ff71037e9c27bc6216805",
"testharness"
],
- "referrer-policy/same-origin/meta-referrer/same-origin/http-http/fetch-request/keep-origin-redirect/same-origin-insecure.http.html": [
- "51d538a7502de1f86c24d73b7c822929fe130e15",
+ "referrer-policy/gen/top.http-rp/unset/img-tag/same-https.keep-origin.http.html": [
+ "63ae656a1bc084f439d34a979f7f161d6c26cd7a",
"testharness"
],
- "referrer-policy/same-origin/meta-referrer/same-origin/http-http/fetch-request/no-redirect/same-origin-insecure.http.html": [
- "09e9945924b2c45fdf8d605673360e97a9634c44",
+ "referrer-policy/gen/top.http-rp/unset/img-tag/same-https.no-redirect.http.html": [
+ "63a3adfeee104f91c678d9ba8ce84ea5486b2117",
"testharness"
],
- "referrer-policy/same-origin/meta-referrer/same-origin/http-http/fetch-request/swap-origin-redirect/same-origin-insecure.http.html": [
- "ebd39b1026f2ab3d19ca43af7012aa0ecbb9fa49",
+ "referrer-policy/gen/top.http-rp/unset/img-tag/same-https.swap-origin.http.html": [
+ "bf559ef2fa1d63406597c09ed5fbd3b21847c613",
"testharness"
],
- "referrer-policy/same-origin/meta-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/same-origin-insecure.http.html": [
- "3cefbeb1b7d46788c7b6a5672a15c7835563724b",
+ "referrer-policy/gen/top.http-rp/unset/script-tag/cross-http.keep-origin.http.html": [
+ "e49bb460dbab8b926c3eee0e8e6e0040c6fec870",
"testharness"
],
- "referrer-policy/same-origin/meta-referrer/same-origin/http-http/iframe-tag/no-redirect/same-origin-insecure.http.html": [
- "1f883558c63dea7fe033a8c1b8a356a732d40aeb",
+ "referrer-policy/gen/top.http-rp/unset/script-tag/cross-http.no-redirect.http.html": [
+ "cc431565cb16ac0042be8eb61b37c02c901b2314",
"testharness"
],
- "referrer-policy/same-origin/meta-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html": [
- "d705e0ad3247fac9ef208f64a9941daef6414fe2",
+ "referrer-policy/gen/top.http-rp/unset/script-tag/cross-http.swap-origin.http.html": [
+ "acba24bf6482e9208b25e9fdfedd9d908f00002d",
"testharness"
],
- "referrer-policy/same-origin/meta-referrer/same-origin/http-http/img-tag/keep-origin-redirect/same-origin-insecure.http.html": [
- "f6a28d48c1c87bada3f91f60d64d46b5874ef751",
+ "referrer-policy/gen/top.http-rp/unset/script-tag/cross-https.keep-origin.http.html": [
+ "6d335a915c88ebfd502e7a7edec108468ef52ba0",
"testharness"
],
- "referrer-policy/same-origin/meta-referrer/same-origin/http-http/img-tag/no-redirect/same-origin-insecure.http.html": [
- "a38fcd1affaa899d1df49f5fef443ac3679a04af",
+ "referrer-policy/gen/top.http-rp/unset/script-tag/cross-https.no-redirect.http.html": [
+ "a72d9f9d555eb60ee0e7ebbc9fab32a1d3230fe3",
"testharness"
],
- "referrer-policy/same-origin/meta-referrer/same-origin/http-http/img-tag/swap-origin-redirect/same-origin-insecure.http.html": [
- "9ac2ca34857a77a6729ccb2aae308e72c339deae",
+ "referrer-policy/gen/top.http-rp/unset/script-tag/cross-https.swap-origin.http.html": [
+ "5ae41b8a4757fccb99c9cb44059b34cfc4370da4",
"testharness"
],
- "referrer-policy/same-origin/meta-referrer/same-origin/http-http/module-worker/keep-origin-redirect/same-origin-insecure.http.html": [
- "1dc4c4cd4d1434d9c926697e7b79c8c02759b0fe",
+ "referrer-policy/gen/top.http-rp/unset/script-tag/same-http.keep-origin.http.html": [
+ "41d2ffbf3bb9f94ddba57b8f91ff4b6937797ac7",
"testharness"
],
- "referrer-policy/same-origin/meta-referrer/same-origin/http-http/module-worker/no-redirect/same-origin-insecure.http.html": [
- "1c28100003e25ce97c9adad060a51daf895ebebe",
+ "referrer-policy/gen/top.http-rp/unset/script-tag/same-http.no-redirect.http.html": [
+ "c50346186988fd0f38d4c858493c667d658f06bf",
"testharness"
],
- "referrer-policy/same-origin/meta-referrer/same-origin/http-http/script-tag/keep-origin-redirect/same-origin-insecure.http.html": [
- "8abb5198b865f5e37d740b3c309db0b908351fc5",
+ "referrer-policy/gen/top.http-rp/unset/script-tag/same-http.swap-origin.http.html": [
+ "ccf74bfc9783b89ef645e64dd6b433f2976e4ef4",
"testharness"
],
- "referrer-policy/same-origin/meta-referrer/same-origin/http-http/script-tag/no-redirect/same-origin-insecure.http.html": [
- "9d4630b46c5fbbd68e400010f3df300e4ae770d4",
+ "referrer-policy/gen/top.http-rp/unset/script-tag/same-https.keep-origin.http.html": [
+ "1f3c30737f984e230f66b8951b1efc83602180db",
"testharness"
],
- "referrer-policy/same-origin/meta-referrer/same-origin/http-http/script-tag/swap-origin-redirect/same-origin-insecure.http.html": [
- "58e0f26e2f8c208b6dbd1f2ca7f0b67185a1d98e",
+ "referrer-policy/gen/top.http-rp/unset/script-tag/same-https.no-redirect.http.html": [
+ "8b7f117bd904e95890d417f6dd772dcba17b956b",
"testharness"
],
- "referrer-policy/same-origin/meta-referrer/same-origin/http-http/shared-worker/keep-origin-redirect/same-origin-insecure.http.html": [
- "f47b1f3704618292d0a7af17a2a09983bd1dd474",
+ "referrer-policy/gen/top.http-rp/unset/script-tag/same-https.swap-origin.http.html": [
+ "de7ff149fad8eb3705adfd9d32af4066563bc9e6",
"testharness"
],
- "referrer-policy/same-origin/meta-referrer/same-origin/http-http/shared-worker/no-redirect/same-origin-insecure.http.html": [
- "b45744a94ea9e6d78b225895ad04a572269e4458",
+ "referrer-policy/gen/top.http-rp/unset/sharedworker-classic/same-http.keep-origin.http.html": [
+ "bf5fbd15347c0589d84cf150d64da32e551b9d6c",
"testharness"
],
- "referrer-policy/same-origin/meta-referrer/same-origin/http-http/worker-request/keep-origin-redirect/same-origin-insecure.http.html": [
- "d2061267c24a87e75a1a19c055b9c4dbacd8d77c",
+ "referrer-policy/gen/top.http-rp/unset/sharedworker-classic/same-http.no-redirect.http.html": [
+ "019f99b85150aa1da20a9bffefe9fa81338be86d",
"testharness"
],
- "referrer-policy/same-origin/meta-referrer/same-origin/http-http/worker-request/no-redirect/same-origin-insecure.http.html": [
- "5f35a68ef064b99f3daee011e185569cb0ee241a",
+ "referrer-policy/gen/top.http-rp/unset/worker-classic/same-http.keep-origin.http.html": [
+ "bb03d60a754c84ee3ec4f530ebc1e2af7230dd08",
"testharness"
],
- "referrer-policy/same-origin/meta-referrer/same-origin/http-http/xhr-request/keep-origin-redirect/same-origin-insecure.http.html": [
- "e9787edaecc454615bf1c065a579626b67e58897",
+ "referrer-policy/gen/top.http-rp/unset/worker-classic/same-http.no-redirect.http.html": [
+ "2647d9c0068ca57d5070a0d503748e4d391a7e9b",
"testharness"
],
- "referrer-policy/same-origin/meta-referrer/same-origin/http-http/xhr-request/no-redirect/same-origin-insecure.http.html": [
- "e00a911d55a3d90215651ee693da2e80b18a2e4e",
+ "referrer-policy/gen/top.http-rp/unset/worker-module/same-http.keep-origin.http.html": [
+ "48e9b2fc797ce1bedab11017c450b4bcdc3b7075",
"testharness"
],
- "referrer-policy/same-origin/meta-referrer/same-origin/http-http/xhr-request/swap-origin-redirect/same-origin-insecure.http.html": [
- "699e73a837f9ec7d1dff1ace650456c9c845efe7",
+ "referrer-policy/gen/top.http-rp/unset/worker-module/same-http.no-redirect.http.html": [
+ "c471a2ab65f0027b09a1156a7f9fcba6429c8fac",
"testharness"
],
- "referrer-policy/same-origin/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-insecure.http.html": [
- "fd369ed2ec5f2da36453ab3b9bd39e2695fc43d0",
+ "referrer-policy/gen/top.http-rp/unset/xhr/cross-http.keep-origin.http.html": [
+ "d05cf044d6b27de6fb4b98e67aef5b4ce547298d",
"testharness"
],
- "referrer-policy/same-origin/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html": [
- "426a91f7370a55f1fab13d8fb2d2e3c3c0f6ff97",
+ "referrer-policy/gen/top.http-rp/unset/xhr/cross-http.no-redirect.http.html": [
+ "a46b1806e1d9c4db2f95f0fa58b2b8dad6dd1a62",
"testharness"
],
- "referrer-policy/same-origin/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html": [
- "f0d6cdbf00c720d54d10495703455a1efccb3e1f",
+ "referrer-policy/gen/top.http-rp/unset/xhr/cross-http.swap-origin.http.html": [
+ "bb3472038d3c63f0eecb5edfbc8f524a812c11d1",
"testharness"
],
- "referrer-policy/same-origin/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html": [
- "18250c8c3d9c110c24d0614008973132d01844c5",
+ "referrer-policy/gen/top.http-rp/unset/xhr/cross-https.keep-origin.http.html": [
+ "d7ff137270e823c1a2f2cea7a12bee20beb2ecc9",
"testharness"
],
- "referrer-policy/same-origin/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-insecure.http.html": [
- "019debb40a53427247f6021badcd184878d67d0b",
+ "referrer-policy/gen/top.http-rp/unset/xhr/cross-https.no-redirect.http.html": [
+ "d2fe3e21cd9298d7c3509dff0c9c8f1f8281d37e",
"testharness"
],
- "referrer-policy/spec.src.json": [
- "f69c289526ab79acdebc872725c00a847685591a",
- "support"
+ "referrer-policy/gen/top.http-rp/unset/xhr/cross-https.swap-origin.http.html": [
+ "5646eec59885411e0af515d96f8c34024d2948eb",
+ "testharness"
],
- "referrer-policy/spec_json.js": [
- "346a6218f9e278c550d8829e9089a7da4d8be247",
- "support"
+ "referrer-policy/gen/top.http-rp/unset/xhr/same-http.keep-origin.http.html": [
+ "67e588307b53ca28c28c9b3e6200b69b1e5f129d",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/a-tag/no-redirect/cross-insecure.http.html": [
- "849efbc4e7f285e38b9d8f6e747f87cd1638121e",
+ "referrer-policy/gen/top.http-rp/unset/xhr/same-http.no-redirect.http.html": [
+ "e165cb1f414143495575599ed9f858f16c1e57b6",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-insecure.http.html": [
- "d3ee7cb684b1e59ff32a101ad3034c2f9ecd53b7",
+ "referrer-policy/gen/top.http-rp/unset/xhr/same-http.swap-origin.http.html": [
+ "395832acebdd6263ad535224910868beb89cca31",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/iframe-tag/no-redirect/cross-insecure.http.html": [
- "0f8d60ca672f2a9b335486120b6d81a3088efb6a",
+ "referrer-policy/gen/top.http-rp/unset/xhr/same-https.keep-origin.http.html": [
+ "99224b7cb6b6deff0b505eb90e71434fbc5c8fe8",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-insecure.http.html": [
- "f09d000eb723a6166ee5bf85a3e93f771813b042",
+ "referrer-policy/gen/top.http-rp/unset/xhr/same-https.no-redirect.http.html": [
+ "a2c89524c97aafcac94308f9517379a90f87a0ca",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/cross-insecure.http.html": [
- "e28acbe94298d32f9d34ff3307993c563ffe25a7",
+ "referrer-policy/gen/top.http-rp/unset/xhr/same-https.swap-origin.http.html": [
+ "d868323f574937678d6a273346d62421c5cee6a9",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/no-redirect/cross-insecure.http.html": [
- "948bb08791912b5ab811ca34da60a997c4e45cb0",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html": [
+ "d5c1ef925326b8b7a5a78dc0d38c0bcf20ef510c",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/cross-insecure.http.html": [
- "ebf8d26f51746bfcc3582006b012d96a9216fab1",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html": [
+ "e1b9a4e96e3bc01cfbe0ea37c1e23c462ac09b6c",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/cross-insecure.http.html": [
- "990f752a23d090d7393b2a676c23ff7710496efb",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html": [
+ "ff187967c8a0a4e38b9e80414462aed4f25a5e85",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/script-tag/no-redirect/cross-insecure.http.html": [
- "66f41a0e32574feadfd911114f7d48e12b5a846a",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html": [
+ "aebd335274994b93bf00b07f987e6c41b1da3b04",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/cross-insecure.http.html": [
- "8e23ad41dedb44702abceba00b31d5a720b19767",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html": [
+ "ebc64f516ad2d905280b9bfb29d14a99e25fc074",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
- "3baa66d36b82f19c60c3f85b5f6e2347d43418a4",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html": [
+ "6d2aee1733f3f1d3b91caddbed7140936ba3e46b",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "e5c060c86b3b673d7c9e5360bff394013c7a0267",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html": [
+ "2e465f6103561c575ad1fe457841ebf2390b7811",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html": [
- "8b036117d70250ae2f624999afecf0c00fedbb23",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html": [
+ "eb63faeca13b7be68dd193ca2622ba347ee0aa8d",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "e165003f6eabbdc0de301971e3f04743e5eb876f",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html": [
+ "74d717b82d05c770bfc988a2c0d811a6c7793e47",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "42492e23b77ec9eb33c5114594f5043f7773ae48",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html": [
+ "d889f2adddaa0866412c2e10a7089d1b8ccbacd5",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
- "984b0790d4254ea9c18fdb5eed37bd5b436d05a3",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html": [
+ "3a1981b72b4fd2fa598172291515dd23f100b20c",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "9bcf3910c1ecd04a9df83d300398dd42ab4a632a",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html": [
+ "e8c9f719f6c379441795e06d3fd1502bacfe2974",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "cd8c557f05dca5eae753516200ab2c18ec2fba61",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html": [
+ "0e6de725c15bedd4827bd830b849572da78cfad5",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html": [
- "c38f30635362dd3301e5b37b38b5534c10c125e4",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html": [
+ "f00394f8864ae701a98b4c36b30865ce7ed2249d",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "b38e3d4668b89e961ff4b4d6faef3fe568de4c3b",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html": [
+ "29bbb89fcd4895636fc4656622bfeff320ca0906",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/a-tag/no-redirect/same-insecure.http.html": [
- "a90739dc4990357d878770724092e77241d485f1",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html": [
+ "edb2f7d6cf423e69d7de383a4fb8896e290bd006",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/same-insecure.http.html": [
- "83b3601256f6598d4ecd45da954406b7c8363757",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html": [
+ "245f0e9c4228bb9e8636bf043dd5ba6fef016316",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/iframe-tag/no-redirect/same-insecure.http.html": [
- "72dcd1d2738be6819a7633f3f46b05f6da2d91f9",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html": [
+ "ddd427653f930cb55f3d95a0eca65bfb831a7e2f",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/same-insecure.http.html": [
- "b56aa7a2c44f5a81ed4f0070c931e7141f620b35",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html": [
+ "118bb843efbdac9dfd24fcf365cd119a8bfc8caa",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/same-insecure.http.html": [
- "bc6c1bfd1eac88b62d7692257087acf1bdc4ba05",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html": [
+ "e55d45239c2e38fee5f60511f975fc4a7a54851a",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/no-redirect/same-insecure.http.html": [
- "6087f4b7db9ee86274233ed54c17d812932eedbc",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html": [
+ "34652fae30b2566c39e0a9cd08927408b79ce0ba",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/same-insecure.http.html": [
- "7d2599a1b7137d8dfd030cd49cf93781c1aa8180",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html": [
+ "798a95496ef3d2ca23c061be834a7f62bf7144f1",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/script-tag/keep-origin-redirect/same-insecure.http.html": [
- "6581ee64e4ab670f5eeab7cf70e294872f823985",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html": [
+ "399775f8fd6fea8006a9466b2789011ca3d9c995",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/script-tag/no-redirect/same-insecure.http.html": [
- "9403ed73bcdac48aef3a973274e980bcbf73f56e",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html": [
+ "99b647b458a3e9f4f6a3368160bed2746a710532",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/script-tag/swap-origin-redirect/same-insecure.http.html": [
- "5345da2d6d45f40c793760d90aa5d1c4cda84b37",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html": [
+ "b09756f12a1122df07c522daeb9dc77452f6a153",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
- "7230246dd234ddd552116923751f8838413cbf8a",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html": [
+ "d2a2b71e826b923be99badbcfb2860fdb9927bed",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "382334bba5cccf71d99e6abbbec51ed8e874270a",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html": [
+ "f7c457e5f29240523821c654ab07312ea52a946a",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html": [
- "8481ed5ab38f218ab79abce299333551263eb6b6",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html": [
+ "24eb8842d054b830d24805f7dd86ba7aea1e4761",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "db04cf7f5cc7620372daa6d0a9c86a6d1dcdcbff",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html": [
+ "17bb9c2610ec44dc13d701589d9b290be4984c1c",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "d35d0c25cc029fab16c1e15b958c9ce0a1ef9756",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html": [
+ "29bbc505f9d157eb8e3bb0f6e64fa6ce5591260d",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
- "1a6e2a4aeb304f4ca897598060bdbb87bb270a95",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html": [
+ "7963b7905c6b8167761f9ac9eaabe7229fd0ee27",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "117a3dcd2e95c932ef2bf0084374b69472d626a2",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html": [
+ "843e6926217e2fc75011a38b13be349d80924b99",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "bfd21f6f15f12bfe1123e2d44c699b9611097641",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html": [
+ "464aba106c11f4e760b86a0abf77aeb32e005720",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html": [
- "2e6a113369b5bbcb6de531d36ba95f4fcfa66ba3",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html": [
+ "7dc965416c59126e1798e4e7b1971ce9db3d9187",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "b9d2ab53f9a22f4b2add660ca90793c81ef47c86",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html": [
+ "f941e1e48f968367bcd37cde2b3304eda7e82746",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/a-tag/no-redirect/cross-insecure.http.html": [
- "4dd11a19be9285e60bc044dd955e808ea8871918",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html": [
+ "1e369f1d45da15fe074e294236bf1104e5594c64",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/a-tag/no-redirect/cross-insecure.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html": [
+ "780113a6ee496c2ed07d2e0a83288a96f0cacd8c",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/cross-insecure.http.html": [
- "a65eaa7901b8226bafcf4bc79b53743b9eb3f227",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html": [
+ "75648ff4ecf8544945a1f6a9b92c9403a02ab87b",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/cross-insecure.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html": [
+ "816854345fd9ec295410cd9d8ed7db610768a8da",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/no-redirect/cross-insecure.http.html": [
- "7d5e9f51eef167e58e3487a5d415d7b19abf12de",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html": [
+ "0ab03889e984c1e14ca5b9f50fab415fa088300a",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/no-redirect/cross-insecure.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html": [
+ "c7095216619081c2eb5f406611deedf22a53540a",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/cross-insecure.http.html": [
- "bac63c5fb0e01bc986721007605b944ba9cd4a24",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html": [
+ "37ac290d6b36a38edc4273b3dbc40b9ef2888b0c",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/cross-insecure.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html": [
+ "70ea43205552309af38654b1bdf3ba90ed6acf76",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-insecure.http.html": [
- "60d5073c3fc1d74d7acdb8e1c41d5aca39e58ae9",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html": [
+ "0a25233e4f17b258bcd415430b989bfa0cb71c05",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-insecure.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html": [
+ "0460050d4baa60c1414c0992051bf092f7461e85",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/no-redirect/cross-insecure.http.html": [
- "6be18f7699de255881c679427696c5811714e00c",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html": [
+ "0e7cdab08f80d12b23eacacbeb48d30785f7cf0e",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/no-redirect/cross-insecure.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html": [
+ "7fb8cf98201a176cc4078136968c44902de55036",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-insecure.http.html": [
- "952e77c9cc696858a6fcc455c7397556ea0d190e",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html": [
+ "e49c19a7486cb1c35d30d0bfffebe62309240c08",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-insecure.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html": [
+ "d7be1b63225b92aaae3d028813eb7bc4fcdcf16d",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/cross-insecure.http.html": [
- "48f71be2eb18b34d00592caf6d953e9df61efaa8",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html": [
+ "79dc86420b0143a4a2749b11d0745b7238b55f82",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/cross-insecure.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html": [
+ "013fc3a5a3f4e253d6de2392106013e41ee99565",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/no-redirect/cross-insecure.http.html": [
- "a28deb3c0dc087cf32959b5042b60b175fcf4572",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html": [
+ "20c9d84a14078f0a28549738eba59361729b91ed",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/no-redirect/cross-insecure.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html": [
+ "9d9b89a2560a674fc6cc5a78c263db24dd2b0c94",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/cross-insecure.http.html": [
- "2ebcc268d9326694b3372cd1e8f0f288bdf06784",
+ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html": [
+ "71d97ee0390ed6ec4722b99571e6709ea46e98bf",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/cross-insecure.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/no-referrer/fetch/cross-http.keep-origin.http.html": [
+ "29533784c3f3365ee57323ba9ba5e301a3071f6e",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/cross-insecure.http.html": [
- "6425c693b33390a9f224b682a4d4842e3e9a6c43",
+ "referrer-policy/gen/top.meta/no-referrer/fetch/cross-http.no-redirect.http.html": [
+ "fa3d946a8ae4d8fbf0030bfb08937160fc5c9fc4",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/cross-insecure.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/no-referrer/fetch/cross-http.swap-origin.http.html": [
+ "aea45c919e49cbfa24b282a05c0d2b0415ded39b",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/no-redirect/cross-insecure.http.html": [
- "fcae5517b70fa522a0fdcebaf8ab446567d902ff",
+ "referrer-policy/gen/top.meta/no-referrer/fetch/cross-https.keep-origin.http.html": [
+ "787b33c1ea074d8f2b3bb8737d316c5920f15468",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/no-redirect/cross-insecure.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/no-referrer/fetch/cross-https.no-redirect.http.html": [
+ "8295a63e05a32eceaa16db6c74ee5f3a51e57df0",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/cross-insecure.http.html": [
- "92437dea18b3809878f44bed97975fc1477ec646",
+ "referrer-policy/gen/top.meta/no-referrer/fetch/cross-https.swap-origin.http.html": [
+ "3481eda3ed7cd02d93c40806496bae6e372dad1a",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/cross-insecure.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/no-referrer/fetch/same-http.keep-origin.http.html": [
+ "153563a38b36bcf21d6a133d81de62c49c263fd7",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/cross-insecure.http.html": [
- "9d2f1dc7bb05644439ded95ab122cc08120ab3f0",
+ "referrer-policy/gen/top.meta/no-referrer/fetch/same-http.no-redirect.http.html": [
+ "c19107476238afb4ee491745b43e10278b61edb8",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/cross-insecure.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/no-referrer/fetch/same-http.swap-origin.http.html": [
+ "1d87d656f6799cfc337559d7036eadbabbf23282",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/no-redirect/cross-insecure.http.html": [
- "77a7c7198da445bdad4388fc789e47a9c894b0f7",
+ "referrer-policy/gen/top.meta/no-referrer/fetch/same-https.keep-origin.http.html": [
+ "38fe934f9a917dabc8fd53054b256519b3ee4aa1",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/no-redirect/cross-insecure.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/no-referrer/fetch/same-https.no-redirect.http.html": [
+ "a43637790ace3201c1e4c49cfe059e40604769b1",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/cross-insecure.http.html": [
- "490c294ced54d95ea0d7b01a32a79488440335f7",
+ "referrer-policy/gen/top.meta/no-referrer/fetch/same-https.swap-origin.http.html": [
+ "98fe5237308cb40491b2211e5f15649049e7c8ff",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/cross-insecure.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/no-referrer/iframe-tag/cross-http.keep-origin.http.html": [
+ "bb306873bd803e58663def20eb4eab48356441f6",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
- "22f1f3bdc72507d8c64e0af65d94e4f4df3813b7",
+ "referrer-policy/gen/top.meta/no-referrer/iframe-tag/cross-http.no-redirect.http.html": [
+ "f8e7262bd810d991c4e915a32b9ac8ccf2bd4187",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/no-referrer/iframe-tag/cross-http.swap-origin.http.html": [
+ "b0d75cf0323024ef2187852aa1959c6c686fbfba",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html": [
- "bb47761b3b592311adf367826f6b8c12e3d8fe6d",
+ "referrer-policy/gen/top.meta/no-referrer/iframe-tag/cross-https.keep-origin.http.html": [
+ "6892ef7c4d46896fbab4f51abe6b7e502c67b0a3",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/no-referrer/iframe-tag/cross-https.no-redirect.http.html": [
+ "589122d0e9ff94089e266b8004d6e5a72ec11318",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html": [
- "4dc7edb6f57117af0921062cf1002d121cd71abf",
+ "referrer-policy/gen/top.meta/no-referrer/iframe-tag/cross-https.swap-origin.http.html": [
+ "f4b1440f04bab4e8c2507fec623f0d2936fefc48",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/no-referrer/iframe-tag/same-http.keep-origin.http.html": [
+ "3d85b52254ec15caeb9b1045dd38cb78b2b039a9",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html": [
- "11d7fe3e2615b8dbd292b19e96828f64bf402d9a",
+ "referrer-policy/gen/top.meta/no-referrer/iframe-tag/same-http.no-redirect.http.html": [
+ "89d6d634187e9968c38e81e2eefa8f19eea1d860",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/no-referrer/iframe-tag/same-http.swap-origin.http.html": [
+ "ba283d5a7379c027de8118a06a1d90c62ce5dc04",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "12e2c923aa91f32303b50d21c464e5294e7bdbd6",
+ "referrer-policy/gen/top.meta/no-referrer/iframe-tag/same-https.keep-origin.http.html": [
+ "35b805dcf3033a7a0595b15288cd534aa31a2ba9",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/no-referrer/iframe-tag/same-https.no-redirect.http.html": [
+ "fb1f7ad461b8d01f1564b2a1c4475212bd82d39a",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html": [
- "269c233f650eab06ed06ff43c169c11d39a3e16e",
+ "referrer-policy/gen/top.meta/no-referrer/iframe-tag/same-https.swap-origin.http.html": [
+ "60516dfec7970cd8a05d886e8c71daa683edb73b",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/no-referrer/script-tag/cross-http.keep-origin.http.html": [
+ "9574d97ad89759a77330fd9e2ebd4e1fed6933a3",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "3dc041adb2badfb2316b75dbffe974f2a0508d13",
+ "referrer-policy/gen/top.meta/no-referrer/script-tag/cross-http.no-redirect.http.html": [
+ "b71bb9fe8ad01f2915125d0a50bf641766a7449f",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/no-referrer/script-tag/cross-http.swap-origin.http.html": [
+ "12cc3dd81a7c293a64e9bbe1bca4c1207a77f9d7",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "7985b8b5397af14023b10a458cf4bff381e6362f",
+ "referrer-policy/gen/top.meta/no-referrer/script-tag/cross-https.keep-origin.http.html": [
+ "8bfbb561e96ec75f74795b970f7aa4be6bf9b348",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/no-referrer/script-tag/cross-https.no-redirect.http.html": [
+ "9bec2a9a425cae89073e6dfd164bddd7fda75afa",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
- "6f2526ec2ce8aeaf9167692df1c905cfab3e796e",
+ "referrer-policy/gen/top.meta/no-referrer/script-tag/cross-https.swap-origin.http.html": [
+ "f0e8af619c05266f4a0effe28ece25c5c4ec4b87",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/no-referrer/script-tag/same-http.keep-origin.http.html": [
+ "42f74dc4a201ef1c50837ad14f35d432611a6dc8",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "408a84a46e951c36c0feb9bdd0212a993e95920b",
+ "referrer-policy/gen/top.meta/no-referrer/script-tag/same-http.no-redirect.http.html": [
+ "87492a8c6514c311fbf5a8648e5ca8b607fc9541",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/no-referrer/script-tag/same-http.swap-origin.http.html": [
+ "f4f634401b1cef2e1c9194e313e280532ffd9cd0",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "73a6d401686e1a0f95f9f8bae9869033bc349d2d",
+ "referrer-policy/gen/top.meta/no-referrer/script-tag/same-https.keep-origin.http.html": [
+ "7aae843c139803e4de43a437288b28e4037bb708",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/no-referrer/script-tag/same-https.no-redirect.http.html": [
+ "127e701ac50205a6ccffc5f7776e290fe8b0068b",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html": [
- "db3836944c071dba460dce59008ea6fa17a961f9",
+ "referrer-policy/gen/top.meta/no-referrer/script-tag/same-https.swap-origin.http.html": [
+ "916cbe7f4a7dbcc834302bdee324a467e1a69201",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/no-referrer/sharedworker-classic/same-http.keep-origin.http.html": [
+ "238d76c056d582a3ec6e60bfe3b693e8137af9e0",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "3e93e19a7183a6c4fcf410cc1e4a8fa454d2d386",
+ "referrer-policy/gen/top.meta/no-referrer/sharedworker-classic/same-http.no-redirect.http.html": [
+ "a0902935a133774d0751fb31694f5c5778fe0791",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/no-referrer/worker-classic/same-http.keep-origin.http.html": [
+ "047a7a8f891b3d40a730be9dac7f02192d3598ef",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html": [
- "f556a17b5f43bf05afd4754e3cd640e936242a8c",
+ "referrer-policy/gen/top.meta/no-referrer/worker-classic/same-http.no-redirect.http.html": [
+ "075b7c7043f633e31a764d0d4c765232e9491e37",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/no-referrer/worker-module/same-http.keep-origin.http.html": [
+ "9150b8631d77061bae8ac435cb47f065d248ddd1",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html": [
- "966ccd4a906dc0d41afd3ac3ee3ff674d367a503",
+ "referrer-policy/gen/top.meta/no-referrer/worker-module/same-http.no-redirect.http.html": [
+ "e0d49ad70592ba776d4433c1640a6e8d3390a39f",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/no-referrer/xhr/cross-http.keep-origin.http.html": [
+ "0ef6e1031f86a9264816f4f309178b3fb54db6ef",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html": [
- "b0f1c512bb354c56d3f510c90450ca4ee6c18699",
+ "referrer-policy/gen/top.meta/no-referrer/xhr/cross-http.no-redirect.http.html": [
+ "c7ecbb83014417fefe35f39593d5cb44176ab0b9",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/no-referrer/xhr/cross-http.swap-origin.http.html": [
+ "12cb9b5ba93753f1f2fd1954236d78bbf0e7cbbc",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/a-tag/no-redirect/same-insecure.http.html": [
- "26ba53745768bde86374b247c4543ee89ae0bc59",
+ "referrer-policy/gen/top.meta/no-referrer/xhr/cross-https.keep-origin.http.html": [
+ "28d9711ca7c26c2660297401fdd743554b90aed8",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/a-tag/no-redirect/same-insecure.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/no-referrer/xhr/cross-https.no-redirect.http.html": [
+ "e72cc70a4f2b71be6a90fe20cb3a290ec1373336",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/same-insecure.http.html": [
- "3c24da11403ba810b323e612cd6f159b87490c90",
+ "referrer-policy/gen/top.meta/no-referrer/xhr/cross-https.swap-origin.http.html": [
+ "896939dfae53625a9b7caf2c6752c36be147e579",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/same-insecure.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/no-referrer/xhr/same-http.keep-origin.http.html": [
+ "22886a1de5848ef0d65ab20ecc82e75d54a27027",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/no-redirect/same-insecure.http.html": [
- "5147d1ae55f909add4f70d4992f513c511f0e8b3",
+ "referrer-policy/gen/top.meta/no-referrer/xhr/same-http.no-redirect.http.html": [
+ "9c5bbb3e91458245372eea367c3c6da72b37f744",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/no-redirect/same-insecure.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/no-referrer/xhr/same-http.swap-origin.http.html": [
+ "c526d733ebf4776d2b2dc8c816153f16f4b7dac7",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/same-insecure.http.html": [
- "5f043f56d9cbed2f7b2705ee75382ee730d7cc9d",
+ "referrer-policy/gen/top.meta/no-referrer/xhr/same-https.keep-origin.http.html": [
+ "1d3a007c1ef1c828c12b16af9b7fce1f01cc3ea1",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/same-insecure.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/no-referrer/xhr/same-https.no-redirect.http.html": [
+ "793c851998d45497e96cd2532f5e354b19b0b7a3",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/same-insecure.http.html": [
- "7235b46f693e4457851cd92e86ac7d3cba8e1710",
+ "referrer-policy/gen/top.meta/no-referrer/xhr/same-https.swap-origin.http.html": [
+ "98b4af4aa36a0149db3048b2317400eec0cf1f1a",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/same-insecure.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html": [
+ "74384c6c1f4f74a89cf0a6b9ef86055d207cf664",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/no-redirect/same-insecure.http.html": [
- "898791470cd9ee167418082b55997ce19a6abb6b",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html": [
+ "84dfbd78e6c5b54923dcfcef42f6809c4df512e1",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/no-redirect/same-insecure.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html": [
+ "1cb2eb25b9890316fff6ab4d8dce30cdadd7acae",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/same-insecure.http.html": [
- "915a0e04cb1a09f33261aa9fe94cc422d1bf45e0",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html": [
+ "28b8c14447448e322c3e2ff6cb4cfae671d2c44b",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/same-insecure.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html": [
+ "92caf095e05a080c16d19154e601dbbde08a831a",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/same-insecure.http.html": [
- "2b5c254b315f0bfdac8a08a7f8980bb43da4609a",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html": [
+ "05e1d8ed70c155aaefb87f75947a1564a5ee40b7",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/same-insecure.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/same-http.keep-origin.http.html": [
+ "5a2c3706c77f1bed1cdd47671321fbab5e5700b1",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/no-redirect/same-insecure.http.html": [
- "448fc03146a86d8f18d8ef8956345ec40ce708f2",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/same-http.no-redirect.http.html": [
+ "98119ade78e843ac7727c316f4b11f8ba0646053",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/no-redirect/same-insecure.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/same-http.swap-origin.http.html": [
+ "153fbe73c330b5363269e0f9c50280bc1bf7bd52",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/same-insecure.http.html": [
- "b71a1ba2fea9cfb6325ae0e1f6303372beec70b8",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/same-https.keep-origin.http.html": [
+ "eebe2d506acaa31d54dde32fe068844d2830da95",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/same-insecure.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/same-https.no-redirect.http.html": [
+ "556d503c973bcc946d4ca29a8dd4e26265f21bcf",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/same-insecure.http.html": [
- "c23f33e377c37bffd6eeeec7ee4c5914653d6875",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/same-https.swap-origin.http.html": [
+ "1f1d780c61506ecc39f35f4773d71ec96e9988b2",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/same-insecure.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html": [
+ "c40ee82385e0b286b45f4fa4e2339825820c5154",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/module-worker/no-redirect/same-insecure.http.html": [
- "0f8a61233184e8cbc45dde9b78c94932eca42f43",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html": [
+ "bf99ea1b980f5cee304ad043f34fb0ee0ec31be9",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/module-worker/no-redirect/same-insecure.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html": [
+ "47ce26153a6d9d7790f6c6acdb6bd10eb868d4bf",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/same-insecure.http.html": [
- "25e7bed49668540dd91052806be7e1fe527ccd04",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html": [
+ "450142261f38dcf7da74bb932502b8a278ed34f1",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/same-insecure.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html": [
+ "e96342b7d302fd63204cf873ae52360d5b019c30",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/no-redirect/same-insecure.http.html": [
- "0366ca590a20f83d658ceb67b05316e7fe74f892",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html": [
+ "3aed562819450ed50791dc428fdb27a732be4cac",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/no-redirect/same-insecure.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html": [
+ "a280c51a648588ba7c59f4105543f3b62026f703",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/same-insecure.http.html": [
- "e43090fc94db3696d4f02bd4e7df47e43c48fcae",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html": [
+ "9c6ccb79207594cdf34acfa8d7c56c04e03cab00",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/same-insecure.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html": [
+ "829e02d2b6381d9fbc1031780d81e8106cbee17c",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/same-insecure.http.html": [
- "94737a8ad11f4ea7d4c9ff65252a3aa7ee8cc60c",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html": [
+ "ae420db20acf22eb7ccaadeb2f7ced4789a53af2",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/same-insecure.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html": [
+ "6aed72d2702ef2040a939731c7b7723dbfb324d5",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/shared-worker/no-redirect/same-insecure.http.html": [
- "7f20701fc23b5b089e05629e3151cf7f83b24d6b",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html": [
+ "f29d9a5f033972703a092c987b0a8ae9a8010d39",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/shared-worker/no-redirect/same-insecure.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html": [
+ "e2b5a99d82bb90a702d72b5b4cb04f5a5efa9ab0",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/same-insecure.http.html": [
- "1e0251a14db6b0415f32eca350357a53e8abfc86",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html": [
+ "386be93bf6358a322717f9cd770ab62bcd231f48",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/same-insecure.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html": [
+ "3a5518eadd0dba5e9f7ef891597c51f32c45cfbf",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/worker-request/no-redirect/same-insecure.http.html": [
- "a04b093f0525207dadb659d96f36a704aaf70d9a",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html": [
+ "88126506ddde2a18e5105c6c0b7cd8c01ef27f0b",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/worker-request/no-redirect/same-insecure.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html": [
+ "dacd343e0cc4306a27898a13778098f44d9cf9fa",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/same-insecure.http.html": [
- "4c888a8955acb7c8a054163924cde507bda79e07",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html": [
+ "6ca297fdafa8dbe92a3caa8a101e94d68d89f50b",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/same-insecure.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html": [
+ "ac0e701aaa3461f424547db389cc4047cc22dc70",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/no-redirect/same-insecure.http.html": [
- "ea5c378b938ce2a66188ab352fcea39d81a687ca",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html": [
+ "36a6ca56fe562075d14e7f7613cd99c720baf002",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/no-redirect/same-insecure.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/same-http.swap-origin.http.html": [
+ "3196566b1965c89ede03949090f38f54153244aa",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/same-insecure.http.html": [
- "f95d9dcf86267fa550742e4c39cfe8339abed669",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/same-https.keep-origin.http.html": [
+ "8c41b0aa0a8bddc0a6fc83421996d2859147f659",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/same-insecure.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/same-https.no-redirect.http.html": [
+ "1fdda9f6e1e4ba551762bfde2921e799ad50e791",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
- "2fe55648eebf16c4d566eb6514f5380a060119bd",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/same-https.swap-origin.http.html": [
+ "228b216bf6025c316323322dec56d3242f983662",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html": [
+ "d8b81424121c4749f36ae7f05784a53fa32fa1d9",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html": [
- "805c1fce6ec61832f4168bf459977e44c161e42e",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html": [
+ "13907b6ee3ffefee38792ea3771e8cdaa880fadc",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html": [
+ "2d47f33f9615924849abcb5067e30fc8d9c66598",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html": [
- "3be3cef8fe6e3942c56164d94efffaa791894b0a",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html": [
+ "1a94c31e6e62f8d3a21d5d68de8c64f299dd1139",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html": [
+ "0014f4695628bbd02346f44f754e4080d79fdd60",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html": [
- "001876c67eac2d65c0691d6fab6c9bfa4d3f11ec",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html": [
+ "8153dc4feace0820d9709e185ae6167eb9f35d8c",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/cross-http.keep-origin.http.html": [
+ "3c5fde6f1838007e7c2fb6463e9af4c50b22f25c",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "d065511201c53b37677864f7203d35c5f53a8fef",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/cross-http.no-redirect.http.html": [
+ "3615808744e0ee5670d63368bfaad2e89e095432",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/cross-http.swap-origin.http.html": [
+ "3103661f217d47b4c6f0009855cac98b95e72f8d",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html": [
- "8372e89bb963b59ec9a0032f20e470488c2045af",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/cross-https.keep-origin.http.html": [
+ "6adf33ef956f9d16c2bd06b24b9f5828ea1f7ec8",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/cross-https.no-redirect.http.html": [
+ "187fcb55c867617ae958c91e15fab0acdb76074e",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "0cb91426123cb96a1196e3d062629aaf342d3cc4",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/cross-https.swap-origin.http.html": [
+ "d0a065920323d1d3a4817111ddb4cee8c52b2a19",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/same-http.keep-origin.http.html": [
+ "fd98090afeb652cdf73e67c926dab2800801adbb",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "880ac9540146f6c72f4bbdc1ca67e402712d663a",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/same-http.no-redirect.http.html": [
+ "5ca1a8f90deb6ddf522dd47b2e2fe9cae70528ea",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/same-http.swap-origin.http.html": [
+ "ef2c88d8a3d2e0d3fc5f659ca07b2ac7cd341fde",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
- "d1e21f26bee30a723a7f427c05b7a0b0e6fa256f",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/same-https.keep-origin.http.html": [
+ "ccb48c901026e8e2f81bafc01462cded914ecc9d",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/same-https.no-redirect.http.html": [
+ "95c24803a4cd06c96022fbbcb2fa441c5c0e290e",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "81ea510e48283f0ddbedebd8a728cc61849bf4f2",
+ "referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/same-https.swap-origin.http.html": [
+ "3a3eeacb397fdfcb07f4da4ce651e36272f74eba",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/origin/fetch/cross-http.keep-origin.http.html": [
+ "867e453f9c923119a7425c57cec7f5594c8a1494",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "663532798418ca23df55ce3f7927d3a933ee85a1",
+ "referrer-policy/gen/top.meta/origin/fetch/cross-http.no-redirect.http.html": [
+ "b2ddcd35351241fae77376f27ec978f18c935520",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/origin/fetch/cross-http.swap-origin.http.html": [
+ "955985163c27560c1a2ca4a87ab88ba272b80cc2",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html": [
- "d9bc87d7ed19fda72fb7afefe2a29e1506b93af6",
+ "referrer-policy/gen/top.meta/origin/fetch/cross-https.keep-origin.http.html": [
+ "8cc66b40477736e3d1434de0fb9c48fc2fe061bf",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/origin/fetch/cross-https.no-redirect.http.html": [
+ "6f7f790742b146b5cde63032b12f9fed0f723b06",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "f4c0db2b33b9f959804de082678b4244d2b16de9",
+ "referrer-policy/gen/top.meta/origin/fetch/cross-https.swap-origin.http.html": [
+ "a8475099903c7c3fcf1e5310ff3a9f5cd72f3172",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/origin/fetch/same-http.keep-origin.http.html": [
+ "fdfcaa51c37f26d98a4e6545e52ba93172994fea",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html": [
- "e0a4c18164a223f656bca20615acc77ae1898122",
+ "referrer-policy/gen/top.meta/origin/fetch/same-http.no-redirect.http.html": [
+ "7daa30e19be34a59a6d7e2c4810794ca319c5a67",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/origin/fetch/same-http.swap-origin.http.html": [
+ "bbc11c950d10d074556bf6e99e7b332ab5383286",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html": [
- "ddf12c7dfbc00c191b836368289b5a3e168809fe",
+ "referrer-policy/gen/top.meta/origin/fetch/same-https.keep-origin.http.html": [
+ "f07cda1a0ae7faea6363ab51f3203f6f7d1e53f4",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/origin/fetch/same-https.no-redirect.http.html": [
+ "17ced6cb6334d29e46950c1b105e68c1d278ab1f",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html": [
- "967c856ca9453215c14f47682e5f5c384ccc1899",
+ "referrer-policy/gen/top.meta/origin/fetch/same-https.swap-origin.http.html": [
+ "297a37bcccd9294d27c09cb57430fcb66ae2a517",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html.headers": [
- "d74467b0af6f7dda8bee9107a37e9c14661a9054",
- "support"
+ "referrer-policy/gen/top.meta/origin/iframe-tag/cross-http.keep-origin.http.html": [
+ "aec51043d2532b88ee7780d8b8213a9e1dbe4866",
+ "testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/a-tag/no-redirect/cross-insecure.http.html": [
- "e2c794e2e2703178b33309c15df52fc5a92933fa",
+ "referrer-policy/gen/top.meta/origin/iframe-tag/cross-http.no-redirect.http.html": [
+ "ea5a1e65912675187835c20a2a908ee7a5fbf615",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/fetch-request/keep-origin-redirect/cross-insecure.http.html": [
- "1d53a856484fdd89788f01d9a4b845effd7978dc",
+ "referrer-policy/gen/top.meta/origin/iframe-tag/cross-http.swap-origin.http.html": [
+ "5dd09037aed5402ae94a40c40c8dbd9dad61fed9",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/fetch-request/no-redirect/cross-insecure.http.html": [
- "11002b84ccd9df3557d2e6ddbf02cb16ad2fedd4",
+ "referrer-policy/gen/top.meta/origin/iframe-tag/cross-https.keep-origin.http.html": [
+ "d2eace1a501c220780ef96e1b50973afd50824b7",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/fetch-request/swap-origin-redirect/cross-insecure.http.html": [
- "0660a7152c1fcc70b13f1217e8d5c322eec9a588",
+ "referrer-policy/gen/top.meta/origin/iframe-tag/cross-https.no-redirect.http.html": [
+ "7a2872df2d615a72b8c435ec4ace478f8e600735",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-insecure.http.html": [
- "6dcd7f6fb5cc911026deb559215746d75589d151",
+ "referrer-policy/gen/top.meta/origin/iframe-tag/cross-https.swap-origin.http.html": [
+ "6c3af754b6149fda84544c1b0a815dba6cfb7848",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/iframe-tag/no-redirect/cross-insecure.http.html": [
- "0776180d9a21724f75f8e9a425d8ea63f62712f7",
+ "referrer-policy/gen/top.meta/origin/iframe-tag/same-http.keep-origin.http.html": [
+ "1fde956c52e65732797cf9a11d225dff86d8738f",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-insecure.http.html": [
- "38e9578454e0fe748dd9cc37b4c954a55c81e7ab",
+ "referrer-policy/gen/top.meta/origin/iframe-tag/same-http.no-redirect.http.html": [
+ "9090a56f19c6376d3ec6cae91ad54959220675f8",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/cross-insecure.http.html": [
- "6f0993c801077a16480913be20c0375af1eb9eb8",
+ "referrer-policy/gen/top.meta/origin/iframe-tag/same-http.swap-origin.http.html": [
+ "69827f5e71d7a38e83ace9292f38237e3a496317",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/no-redirect/cross-insecure.http.html": [
- "9e03d5384e9b34246df8ee78306ff83c71cdc38e",
+ "referrer-policy/gen/top.meta/origin/iframe-tag/same-https.keep-origin.http.html": [
+ "321ff5d2dfb91f152442a4b9e6b21d3bab9c3cf3",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/cross-insecure.http.html": [
- "1a928cfec18993f7e92e5d9d500fa595e9ca4248",
+ "referrer-policy/gen/top.meta/origin/iframe-tag/same-https.no-redirect.http.html": [
+ "46d567048a5883f494ed4c8f4f4d5a2434b4b667",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/cross-insecure.http.html": [
- "ab822dec774ded2572fe0d66048ac412619182ca",
+ "referrer-policy/gen/top.meta/origin/iframe-tag/same-https.swap-origin.http.html": [
+ "64567589fa4012692de16ea36728adf33e102bfb",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/script-tag/no-redirect/cross-insecure.http.html": [
- "c51ebf6c472977b322e40b09cc6b24a2b6301713",
+ "referrer-policy/gen/top.meta/origin/script-tag/cross-http.keep-origin.http.html": [
+ "2494c0a49e8d42e26438abbbbf9f326bf115ffa2",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/cross-insecure.http.html": [
- "14ee299d92afc533582cf1c6c61ecfeae34d6b2f",
+ "referrer-policy/gen/top.meta/origin/script-tag/cross-http.no-redirect.http.html": [
+ "5be226f439c883b16e699c069d71c64af3e565f5",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/xhr-request/keep-origin-redirect/cross-insecure.http.html": [
- "ead14cf5f9d95cc7948facf9132ebd024e0ae1eb",
+ "referrer-policy/gen/top.meta/origin/script-tag/cross-http.swap-origin.http.html": [
+ "3496ddd889f386c3db2bb340fae93c12e9566d0b",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/xhr-request/no-redirect/cross-insecure.http.html": [
- "1ee7fd41367e463deced7af98706b5df55374e64",
+ "referrer-policy/gen/top.meta/origin/script-tag/cross-https.keep-origin.http.html": [
+ "ec31a89afa5d0142bb638772fc7667c44a5bc1e6",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/xhr-request/swap-origin-redirect/cross-insecure.http.html": [
- "0110bf0e34f804bcaa84de2612fa5669e0ecf822",
+ "referrer-policy/gen/top.meta/origin/script-tag/cross-https.no-redirect.http.html": [
+ "fcf281ec367b754067810db58a93b39884dadeeb",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
- "12a1bc66e0f32ca381103438654b2bece3152b14",
+ "referrer-policy/gen/top.meta/origin/script-tag/cross-https.swap-origin.http.html": [
+ "93076790b29c30f1c51655658dbbb2877d2893fc",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html": [
- "05ade9a95627e9a26924d4cc71f35bd9505cf527",
+ "referrer-policy/gen/top.meta/origin/script-tag/same-http.keep-origin.http.html": [
+ "7f420bd58c185b0d7e94a0181bed74e771e189e7",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html": [
- "ad0fa26cee566fb4b6bedf853380d63813f8c84b",
+ "referrer-policy/gen/top.meta/origin/script-tag/same-http.no-redirect.http.html": [
+ "75182127e9bdf4c8610ca5abd2eb97bf7f4ef2a8",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html": [
- "074dc1c008c7bb8e8fdde6f8ff02c6853eb1f221",
+ "referrer-policy/gen/top.meta/origin/script-tag/same-http.swap-origin.http.html": [
+ "26f358b9db98ff501a32496a693e2f28c05329bb",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "02a8550756e871660b27addae7ec82d416988d43",
+ "referrer-policy/gen/top.meta/origin/script-tag/same-https.keep-origin.http.html": [
+ "f6a725d396322644acd427353c53197c49d40ef8",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html": [
- "c67cc2478a0c4ec22e2aaf7f6c5d59c67dad6ee4",
+ "referrer-policy/gen/top.meta/origin/script-tag/same-https.no-redirect.http.html": [
+ "b09d3f025e926da42e8d67de2315af37da104cb9",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "e53c8315664a59467e4cf9104ec53d468a16a506",
+ "referrer-policy/gen/top.meta/origin/script-tag/same-https.swap-origin.http.html": [
+ "9e57f2f6421dc2fee6860f3c28b9838382601bae",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "3e11ade1bcf49632358cb1369706410b127b0326",
+ "referrer-policy/gen/top.meta/origin/sharedworker-classic/same-http.keep-origin.http.html": [
+ "32c9c6a506faac59d4091674d72385c4ee367751",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
- "27c4c842c947d851d30f484899de7817cc3b9b30",
+ "referrer-policy/gen/top.meta/origin/sharedworker-classic/same-http.no-redirect.http.html": [
+ "f24202d4c1b7f85e4a9ecbdbc43f1a232cf3f5e1",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "f28e884825ec8151381ea7096a08ee0b9970d1c0",
+ "referrer-policy/gen/top.meta/origin/worker-classic/same-http.keep-origin.http.html": [
+ "525c4babfbf37d61ea2ebdebdbecc0bfb5ea4470",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "5c8ef0ef3e36534c6f55d20a350eea2b057cc8c0",
+ "referrer-policy/gen/top.meta/origin/worker-classic/same-http.no-redirect.http.html": [
+ "c1c8aa627c0180a4d4b2a9a6f24c0d5b7b683969",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html": [
- "bb9bf2c1ee527e28565534ee1c2d28822c4fc4ba",
+ "referrer-policy/gen/top.meta/origin/worker-module/same-http.keep-origin.http.html": [
+ "8482d7d2aaf55fe91fb22fbfd8a737d3038b064c",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "a4798d7b47dc4b40d8ccab8ba165960dd39083e8",
+ "referrer-policy/gen/top.meta/origin/worker-module/same-http.no-redirect.http.html": [
+ "01fd9140510450be1317f34e29147d50dcabfd0c",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html": [
- "0b58c64c20083db51771bd7c3cace87a110ee4f5",
+ "referrer-policy/gen/top.meta/origin/xhr/cross-http.keep-origin.http.html": [
+ "10ae3a06788f5740dd0edebb7d534bcd83907eeb",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html": [
- "3ab27355d0961a88c2b5027d5a23c43181deb5c4",
+ "referrer-policy/gen/top.meta/origin/xhr/cross-http.no-redirect.http.html": [
+ "21015150882dece291fd9cfb976bfb6889cdb545",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html": [
- "6c8d7ecd7b86dc645eff07273de21cce82e4bb94",
+ "referrer-policy/gen/top.meta/origin/xhr/cross-http.swap-origin.http.html": [
+ "8450e8b704486844fb1ab38d0e400915e607b550",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/a-tag/no-redirect/same-insecure.http.html": [
- "62b85068c20f75deb45c338bbb0fecfdef214f38",
+ "referrer-policy/gen/top.meta/origin/xhr/cross-https.keep-origin.http.html": [
+ "f20930965653416eb0c832ba1624e0dff81c86c3",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/fetch-request/keep-origin-redirect/same-insecure.http.html": [
- "efcd74ac789e061e8bdf00f71b16efa680feadf0",
+ "referrer-policy/gen/top.meta/origin/xhr/cross-https.no-redirect.http.html": [
+ "bd7f2f73327d38afcac57fdc2c9784d65d844b68",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/fetch-request/no-redirect/same-insecure.http.html": [
- "eb84455bc12bbd49cf390d13c16a7a1213686249",
+ "referrer-policy/gen/top.meta/origin/xhr/cross-https.swap-origin.http.html": [
+ "ee4f2c5c6b1808690332090e0e5a2a5bbdbb8d58",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/fetch-request/swap-origin-redirect/same-insecure.http.html": [
- "dc71fc362ed21dcc213dea7b331b3db2d70ce51d",
+ "referrer-policy/gen/top.meta/origin/xhr/same-http.keep-origin.http.html": [
+ "011a0a9d20f9388bc34ff5e0a60575ce10694d16",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/same-insecure.http.html": [
- "8752f5d2cc850bbd9a3641d18841348d11178b2b",
+ "referrer-policy/gen/top.meta/origin/xhr/same-http.no-redirect.http.html": [
+ "aed06c5c1b893ac199b645f63e87e9d990990a82",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/iframe-tag/no-redirect/same-insecure.http.html": [
- "4c3a3e733ddabf4cc85d1adefc938a557d97ebbd",
+ "referrer-policy/gen/top.meta/origin/xhr/same-http.swap-origin.http.html": [
+ "c6d9c461b9bfd6eb95681936c2239a516175d598",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/same-insecure.http.html": [
- "33640559429c05e53955c8ea74c5e64e8500ddfc",
+ "referrer-policy/gen/top.meta/origin/xhr/same-https.keep-origin.http.html": [
+ "cb5e94086b0514b9232099d9ed4eac7ddbca4e4d",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/img-tag/keep-origin-redirect/same-insecure.http.html": [
- "9acebe2f0b09702c5f00103067bc748e9f4b5744",
+ "referrer-policy/gen/top.meta/origin/xhr/same-https.no-redirect.http.html": [
+ "1702c3f10f8d75e09e723346709579203545dfa4",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/img-tag/no-redirect/same-insecure.http.html": [
- "d1f8677bc8b25eaf2f27b83d91ccad1bd1bb9b41",
+ "referrer-policy/gen/top.meta/origin/xhr/same-https.swap-origin.http.html": [
+ "674b324bded844ca9826eabb4e0d1769cd001f24",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/img-tag/swap-origin-redirect/same-insecure.http.html": [
- "a205d415fa384d246f497656e6bce1cfa161368e",
+ "referrer-policy/gen/top.meta/same-origin/fetch/cross-http.keep-origin.http.html": [
+ "4623293b2b98547b4f185ddd6ca3b675e5e582e6",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/module-worker/keep-origin-redirect/same-insecure.http.html": [
- "dbffdfd9b707e88f5f28860eee87fe5f443c7631",
+ "referrer-policy/gen/top.meta/same-origin/fetch/cross-http.no-redirect.http.html": [
+ "3d2b7856f67066fccea45e2dd1f8536fe9f6936f",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/module-worker/no-redirect/same-insecure.http.html": [
- "ac598a4aef96049385b08267dc3c377c2e5ee376",
+ "referrer-policy/gen/top.meta/same-origin/fetch/cross-http.swap-origin.http.html": [
+ "6f86e2c9fe67a8e7a621e2c0850dea051008fa41",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/script-tag/keep-origin-redirect/same-insecure.http.html": [
- "fe796af905de4fe4111cef8abea5e089eb2b83a8",
+ "referrer-policy/gen/top.meta/same-origin/fetch/cross-https.keep-origin.http.html": [
+ "9734af21a03e2bb78121df4a5d261d8c1f5a1576",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/script-tag/no-redirect/same-insecure.http.html": [
- "df0b66b578af3223d45b29041558bf4e1661e04e",
+ "referrer-policy/gen/top.meta/same-origin/fetch/cross-https.no-redirect.http.html": [
+ "dd32b51d9cd5a236d3ce6477186a5eeb66ebe3dd",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/script-tag/swap-origin-redirect/same-insecure.http.html": [
- "3e6a5ef1e50317b735fdc3abeaba0d7228a764f8",
+ "referrer-policy/gen/top.meta/same-origin/fetch/cross-https.swap-origin.http.html": [
+ "375ac257f6a7126e24816624d91cc3f147bb4d91",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/shared-worker/keep-origin-redirect/same-insecure.http.html": [
- "fc8d3c41bbbc5d1af4c4482e6de160d7978a3b70",
+ "referrer-policy/gen/top.meta/same-origin/fetch/same-http.keep-origin.http.html": [
+ "6742ffba5680348fe242e11468118209b6cbcca1",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/shared-worker/no-redirect/same-insecure.http.html": [
- "3291f436ea9a1bfb7a8018bed641c364c1446c1b",
+ "referrer-policy/gen/top.meta/same-origin/fetch/same-http.no-redirect.http.html": [
+ "67ecbd6eefb54c1b90d8ba903e6be9519c28ef37",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/worker-request/keep-origin-redirect/same-insecure.http.html": [
- "19ad046a8a67f96ce419bb44ab822a02c7b7682c",
+ "referrer-policy/gen/top.meta/same-origin/fetch/same-http.swap-origin.http.html": [
+ "6163be73c9e2ba94aa0e015519ab73f6b5c2d25b",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/worker-request/no-redirect/same-insecure.http.html": [
- "c8fe4c6ec6f86915b77e6095a6127d099637c825",
+ "referrer-policy/gen/top.meta/same-origin/fetch/same-https.swap-origin.http.html": [
+ "0bc2c07d8316c27d77ebd74ddfb68359e9fc17bc",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/xhr-request/keep-origin-redirect/same-insecure.http.html": [
- "ec2f7efe8ac7dc521f7b2f25668d96482d42a175",
+ "referrer-policy/gen/top.meta/same-origin/iframe-tag/cross-http.keep-origin.http.html": [
+ "cf05e166a2335c1b6b3480bafb4e28dfb05f7bfb",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/xhr-request/no-redirect/same-insecure.http.html": [
- "207a092d6798444ebc8a83af699623c50e097684",
+ "referrer-policy/gen/top.meta/same-origin/iframe-tag/cross-http.no-redirect.http.html": [
+ "15ac1c56f435634b72fc23dc812f68c9575c501d",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/xhr-request/swap-origin-redirect/same-insecure.http.html": [
- "6ca54f8161040c78f75e411cdbd844cd0dfefef5",
+ "referrer-policy/gen/top.meta/same-origin/iframe-tag/cross-http.swap-origin.http.html": [
+ "54a2884ecd301353ef2be80ce3db9436d546e175",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
- "d8ba3dd25db345606c23cada85894fb6a4438456",
+ "referrer-policy/gen/top.meta/same-origin/iframe-tag/cross-https.keep-origin.http.html": [
+ "3e7e1bc166b6aa46ca740fc07469c0f0356c4211",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html": [
- "6d3dc7018c6a28283c1fa349127a96952b4517e6",
+ "referrer-policy/gen/top.meta/same-origin/iframe-tag/cross-https.no-redirect.http.html": [
+ "942691f66aef6e30e48dc89fc073535a79e517cf",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html": [
- "685cb213ab02e952e458b4a9cd517c5f9b6fd4ff",
+ "referrer-policy/gen/top.meta/same-origin/iframe-tag/cross-https.swap-origin.http.html": [
+ "cf51aa15b1b388082694e30853658ba8c90d752d",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html": [
- "65b84cbd52ea2c2c0df226a61cc982fb61c3b3c6",
+ "referrer-policy/gen/top.meta/same-origin/iframe-tag/same-http.keep-origin.http.html": [
+ "d87e8674b1d64a4581dce283d5a9a91fe8bff657",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "931a865b0a02b7ef2607a09e061f1ebdf1443035",
+ "referrer-policy/gen/top.meta/same-origin/iframe-tag/same-http.no-redirect.http.html": [
+ "8bc96f3cb553e4cb0002881e5c0da68497134fc5",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html": [
- "44da9c8838ea94c82e1f3b7c037c93c3b5ef8a6a",
+ "referrer-policy/gen/top.meta/same-origin/iframe-tag/same-http.swap-origin.http.html": [
+ "16e76d16d20001159ef33227f8aaeee3f75475f5",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "3e272c6f36d9bebf5ca281be728511943a851ac1",
+ "referrer-policy/gen/top.meta/same-origin/iframe-tag/same-https.swap-origin.http.html": [
+ "84063c89db2fa5425c81f4a1f32db835ea6313a2",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "4b94af4929c8b30586ba2b477233e7e493103b4b",
+ "referrer-policy/gen/top.meta/same-origin/script-tag/cross-http.keep-origin.http.html": [
+ "b7e3924092b5dfe03caf3d7a44fe3c74251f41b1",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
- "95d6345f7c4034ce5f7d8c0c3302f921a72357bb",
+ "referrer-policy/gen/top.meta/same-origin/script-tag/cross-http.no-redirect.http.html": [
+ "5ff171a3863604df0a80673e1e02a192b915b3f2",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "17f127f60366df1597b5187241a7e7437172152e",
+ "referrer-policy/gen/top.meta/same-origin/script-tag/cross-http.swap-origin.http.html": [
+ "0361ecee0422419988d4d37e44ab89d5fd0b9a1b",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "bfb222a4475e3e30e4157b226a6691ad8a8cc36a",
+ "referrer-policy/gen/top.meta/same-origin/script-tag/cross-https.keep-origin.http.html": [
+ "c2223be2345599fce0f714fe911dea54dc94caba",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html": [
- "e989b00ce58422bf96d5edadc6bdce3bfe8a5bba",
+ "referrer-policy/gen/top.meta/same-origin/script-tag/cross-https.no-redirect.http.html": [
+ "9655ad2b23833661ac4855ceb0449b703f682a52",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "a1f1e0e6f1bb844ba25187609dfd4e5e02bf3f3e",
+ "referrer-policy/gen/top.meta/same-origin/script-tag/cross-https.swap-origin.http.html": [
+ "dab25e384d7140165ce0e41e56dc7c9925747818",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html": [
- "ec4786e1e4da125ba01fb8a32debbcb749625980",
+ "referrer-policy/gen/top.meta/same-origin/script-tag/same-http.keep-origin.http.html": [
+ "694a8a845b2e88e17f5d57110e26dafb3c16ae61",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html": [
- "baee333cbb8e278265153f34cce2ec68b37f6924",
+ "referrer-policy/gen/top.meta/same-origin/script-tag/same-http.no-redirect.http.html": [
+ "6dfac02ae12230547e67b2c43d7e73193f037131",
"testharness"
],
- "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html": [
- "2041b46c26cadda361ddaa2843cffd7f1ebb7f77",
+ "referrer-policy/gen/top.meta/same-origin/script-tag/same-http.swap-origin.http.html": [
+ "65d0d0371428bf9c174dab0394c193e4d3d52984",
"testharness"
],
- "referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html": [
- "2fb347ef35b8ecc2206f272db95156cdb9a0e771",
+ "referrer-policy/gen/top.meta/same-origin/script-tag/same-https.swap-origin.http.html": [
+ "3c6e7b143e967c38725bcf2db74bc08dfc21ba48",
"testharness"
],
- "referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html": [
- "0c34da119fcb3634866a7fe153256c3c92fcfa3f",
+ "referrer-policy/gen/top.meta/same-origin/sharedworker-classic/same-http.keep-origin.http.html": [
+ "d5396abbc58275ac4e6deafc88d252cafd026447",
"testharness"
],
- "referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html": [
- "f992e3939256b8eb977231539bed90323c4b3ccd",
+ "referrer-policy/gen/top.meta/same-origin/sharedworker-classic/same-http.no-redirect.http.html": [
+ "d6e198ad0a9363a67788b563bdcf120ab875e13b",
"testharness"
],
- "referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html": [
- "e1e6c13ea358c7f8f0178a37a30505271bb2b446",
+ "referrer-policy/gen/top.meta/same-origin/worker-classic/same-http.keep-origin.http.html": [
+ "bb60709ee88cfee1f7ceabb6892933ba73c7fc50",
"testharness"
],
- "referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html": [
- "fc07b47fd6408b74c6767dbfc385adf699844614",
+ "referrer-policy/gen/top.meta/same-origin/worker-classic/same-http.no-redirect.http.html": [
+ "1054ef30ef0abfde188b862e549fb0cc670ab69a",
"testharness"
],
- "referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html": [
- "083891dc3c131fb56f8d5372ca206b597c6cae71",
+ "referrer-policy/gen/top.meta/same-origin/worker-module/same-http.keep-origin.http.html": [
+ "3896c5c5d216369648a233c93ccf3437b6ad967a",
"testharness"
],
- "referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html": [
- "07601e37eb0bc39eb87bc3c8901d27bf6792f61f",
+ "referrer-policy/gen/top.meta/same-origin/worker-module/same-http.no-redirect.http.html": [
+ "ce7fa2f229884001cb5c4f785736ba3062292de7",
"testharness"
],
- "referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html": [
- "811265f11cecd9ca5e83c8ac4c51bd1f29c14d1a",
+ "referrer-policy/gen/top.meta/same-origin/xhr/cross-http.keep-origin.http.html": [
+ "49168ce2fba0170cbed920155bfd4e770de65d20",
"testharness"
],
- "referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html": [
- "254a29152f87e95359fffd4749b2c625d379c3d3",
+ "referrer-policy/gen/top.meta/same-origin/xhr/cross-http.no-redirect.http.html": [
+ "0f6ad03b52f600cffea743a6732f9c64d352234f",
"testharness"
],
- "referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html": [
- "f78fb878fffa6e52bd41177b219b019cb03bd482",
+ "referrer-policy/gen/top.meta/same-origin/xhr/cross-http.swap-origin.http.html": [
+ "b081fd75cabcdf1ed46b69bed5879414931b58ba",
"testharness"
],
- "referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
- "9c5035945c9081f4527343ba6df6372050def682",
+ "referrer-policy/gen/top.meta/same-origin/xhr/cross-https.keep-origin.http.html": [
+ "d6ce96eac6251a377e4e8567a76fe77e5fc921c3",
"testharness"
],
- "referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "4b238c0449d93ae792be3d56fd2d3640b28ef8d2",
+ "referrer-policy/gen/top.meta/same-origin/xhr/cross-https.no-redirect.http.html": [
+ "8c35488b0b4f2b184c4dfb29dcded0aa2a7087fa",
"testharness"
],
- "referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html": [
- "a860c257fd7cf4566bc988827416c09dfde21392",
+ "referrer-policy/gen/top.meta/same-origin/xhr/cross-https.swap-origin.http.html": [
+ "1ef6481ad45f726000089935f99b767923beec58",
"testharness"
],
- "referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "a798c85d6f54988404b28b9afb0017dac6e8bcc3",
+ "referrer-policy/gen/top.meta/same-origin/xhr/same-http.keep-origin.http.html": [
+ "2a1f7434eb398620d0b984706634559aa8be82e2",
"testharness"
],
- "referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "3955b78f7ac922c6e05c118dd0c1c99aa675c56f",
+ "referrer-policy/gen/top.meta/same-origin/xhr/same-http.no-redirect.http.html": [
+ "4d21f0d155a065556fe369232000cf227064c557",
"testharness"
],
- "referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
- "f755d35c825441c134ad8b567f9283c1037a970b",
+ "referrer-policy/gen/top.meta/same-origin/xhr/same-http.swap-origin.http.html": [
+ "2db9e9aae41bfd9c53183e8804770da31102d64b",
"testharness"
],
- "referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "240a3c7f186c06a8271ed65e4bb9a868cf24f92b",
+ "referrer-policy/gen/top.meta/same-origin/xhr/same-https.swap-origin.http.html": [
+ "c38435bd25c4a9e1af2cc98a425f74250c728dd6",
"testharness"
],
- "referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "8d18e84cb76041841df3ca418d8c63f023c38424",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html": [
+ "9b79a324fcfcee738da044c448e3bdde7fb02f4d",
"testharness"
],
- "referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html": [
- "38edd1b85df4ba87ddac07869eac39e9123d9a99",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html": [
+ "5e6b89694ddf61bb4a6b37abddf6d6a6536b446f",
"testharness"
],
- "referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "95f4a17a2a762a1dbdd65b5a6c85899923269d6c",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html": [
+ "a215963198039a541ac50cdd65572767e27d0cb0",
"testharness"
],
- "referrer-policy/strict-origin/attr-referrer/same-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html": [
- "f80ba3759587e78087833d49cc28922a3020b9f6",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html": [
+ "e47bee01a5ebd9b2623271262447115e9d61c111",
"testharness"
],
- "referrer-policy/strict-origin/attr-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html": [
- "ed1b8c033be379b88933ea8c070194a9d0464ade",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html": [
+ "87e7a2fa1139228bc9745ad250dce3816e73933a",
"testharness"
],
- "referrer-policy/strict-origin/attr-referrer/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html": [
- "050eb6a3904a4dbfcbaa5bff5c4b7a04c5cee3f7",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html": [
+ "cc43a46b9754b7949cf6f56d79feee2cc770efca",
"testharness"
],
- "referrer-policy/strict-origin/attr-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html": [
- "143f3f7c87a289c9dc0c673dacbbc537b43f3a36",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html": [
+ "8d5fcabef9044438e105d0e27f9eb14a8f7df936",
"testharness"
],
- "referrer-policy/strict-origin/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html": [
- "ffc8190298064e81a4c3bc0ef0c3627cc83375a8",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html": [
+ "ac1c025ef8fd6ef845abc5faa5ba50f4c4b3f3a1",
"testharness"
],
- "referrer-policy/strict-origin/attr-referrer/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html": [
- "5d8be2bd928046bc40f74a14484e1bbd2f608ae8",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html": [
+ "489f5774d9de3b56455b28308ccdbc97b050f52d",
"testharness"
],
- "referrer-policy/strict-origin/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html": [
- "7ceb389b35b5e21b63fedd186ca8583d5c7c66ff",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html": [
+ "765f0bb942067d74d5526655f4e65d14a1854f30",
"testharness"
],
- "referrer-policy/strict-origin/attr-referrer/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html": [
- "f3f5573b7582ec9cce17345415f2df932a829451",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html": [
+ "8752c9a74261d1d45b6aaa9d045573f7b22df035",
"testharness"
],
- "referrer-policy/strict-origin/attr-referrer/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html": [
- "55edfc9376002b493f8a271fc7a5d62c27748802",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html": [
+ "07aebd3a6349c8918e320ec11baf07b14870e551",
"testharness"
],
- "referrer-policy/strict-origin/attr-referrer/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html": [
- "902fa3341a1812c19d8091055333bee7993745a3",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html": [
+ "b466777451092f884b6d4c35882ff1b3baaa83ee",
"testharness"
],
- "referrer-policy/strict-origin/attr-referrer/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
- "bd278695088c2cfdd5d028903cfe94f216d8114b",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html": [
+ "bffd18d59d5b8f42d7fd5bef71d958fd0ca6636f",
"testharness"
],
- "referrer-policy/strict-origin/attr-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "331f865afb25e0066d4fa4861126931693eb0404",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html": [
+ "0ba113edbdc30d4aa70c2f5816cab2a26af58e89",
"testharness"
],
- "referrer-policy/strict-origin/attr-referrer/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html": [
- "b26af2a076cdfdab3c761264efdb65452f32b7c1",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html": [
+ "e735928761490ecef87025c1775c2d181ab10c53",
"testharness"
],
- "referrer-policy/strict-origin/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "0d7bdf20697948d118f95f71f69bae85e02151f6",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html": [
+ "e8d8b617ad0464ca3baf9b36527f082ea9636d50",
"testharness"
],
- "referrer-policy/strict-origin/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "1360edbceff54f3bfa446af531db26a377ca007c",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html": [
+ "d961eafb7fc8d73d1e10fee9fda6364de970d2ca",
"testharness"
],
- "referrer-policy/strict-origin/attr-referrer/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
- "2f99fa632176959bf717ef2a4eb6e3851c99d264",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html": [
+ "fad227d9b3bfa6cd80ea3b2b35d5dd487fb662c2",
"testharness"
],
- "referrer-policy/strict-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "f69c1341e0992a2fc3f1306c5cc3c795395e550f",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html": [
+ "04941be8e609fdfa9677aa72aafb4e664e33f9f3",
"testharness"
],
- "referrer-policy/strict-origin/attr-referrer/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "e7ea376cd142a551f3178e35389c9f28e83224a4",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html": [
+ "d060ed1e12d2cbaa324b25981424bb93382cb8fb",
"testharness"
],
- "referrer-policy/strict-origin/attr-referrer/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html": [
- "859c7267ad547066506e11518ddfac7ebcf16b1e",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html": [
+ "9fb1fe3b6ca95d01084d7ebca8c2f652997e2871",
"testharness"
],
- "referrer-policy/strict-origin/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "747c8e1059db4aeadb3d99fa855619e522d8b225",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html": [
+ "83146badd7f6b53aaa05203ffa1dfe172812a8e3",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html": [
- "9aa77a78c63ae46e9fc13923c66f3d77c1b8e7c3",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html": [
+ "542d4e266eb66d02b94d8648bf00f53690632770",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
- "support"
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html": [
+ "c076fc85e271074ed2c28d8f6fe73afd399cc9e9",
+ "testharness"
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html": [
- "0db6b0fbc2eec5daf60008dd4964cb21562202a3",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html": [
+ "88ad2099aa19b335a3c2a2f0f734014725976709",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
- "support"
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html": [
+ "f72a238f1b06c62db51514909635a24cd8d0d98e",
+ "testharness"
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html": [
- "95eb256986e7a6d136f67b50618f9e350a1e7a1e",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html": [
+ "7086dc263bcfadb7a3302841b163e7b0606466a8",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
- "support"
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html": [
+ "374e670f2eaec38b2a23362a9a343fe2cc6d5088",
+ "testharness"
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html": [
- "59de544a1c0a68ac1bf3fd62c490e905f232d6a7",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html": [
+ "e6a4a1cae8361560c75178274777ab0fc6ee5b42",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
- "support"
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html": [
+ "370b27bd52c9e72103c954e95c0fa749711d73c3",
+ "testharness"
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html": [
- "42dffc718dd65acb4d73bb210411e578c5be7bda",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html": [
+ "378e4373ddcd8d824337115b387dbadc868bd66b",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
- "support"
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.swap-origin.http.html": [
+ "e1fd5deaedfd4915fb4ef60008d9e6e2cf272737",
+ "testharness"
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html": [
- "a1c0ad2ecbd2a5662f2fdb5bf526ad349cc7b79a",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-https.keep-origin.http.html": [
+ "06b54e84a106daecac86e9061f5a3696c31a1ca8",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
- "support"
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-https.no-redirect.http.html": [
+ "dfda8a029c25cc67c911cb4db30f14170f795cf5",
+ "testharness"
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html": [
- "4214ed39789ce51abfee360bbe79f4f4a796b2f6",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-https.swap-origin.http.html": [
+ "09065d9a990e069dc013f637a42f95ee9de8f4e7",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
- "support"
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html": [
+ "795b1a698b07e4bef8c3ff86d7548c6ff3e10355",
+ "testharness"
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html": [
- "c74fdf48aa7204d5d0d0b759bfabb407020cf2d2",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html": [
+ "704f1cfab82a2467f27da047ed398aee0f5286d0",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
- "support"
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html": [
+ "8dc9c49ef914632ed0bd485f81fbfa4cf10f8294",
+ "testharness"
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html": [
- "d6c256cdd00de76a5b4f9e50836da6568a34a7f4",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html": [
+ "0d782a2f3e5800d5db1c46388feb842fb2cbca72",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
- "support"
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html": [
+ "00c95830a33881d207fc4a6b86ed351cafb0520b",
+ "testharness"
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html": [
- "84f50a7242b27c3c524fc10d6ea9b95b1e86d98d",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html": [
+ "4634152ff50a640040fe9cd4cdc3b2ff510ac6ba",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
- "support"
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/cross-http.keep-origin.http.html": [
+ "ef5004a926988069f7c0444c223805a309d0892c",
+ "testharness"
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html": [
- "a4c9484c8c0939098c6c16683f804bd568bc8320",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/cross-http.no-redirect.http.html": [
+ "e66aad43404c3e6b07db967d2eeaed24d7bc1847",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
- "support"
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/cross-http.swap-origin.http.html": [
+ "39a5950384885a51ea076fa6be2a6c9014e58519",
+ "testharness"
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html": [
- "5ff5761550074bb1beeed4e66a68bd8631c260a6",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/cross-https.keep-origin.http.html": [
+ "75dc714ae3b487362ab177f5c4d22616be353f7a",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
- "support"
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/cross-https.no-redirect.http.html": [
+ "ca88f4bd3a351198405ea9501d62a94a495ace08",
+ "testharness"
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html": [
- "214d0a41e68e9e0757023a9a1c4c8776622a3bf8",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/cross-https.swap-origin.http.html": [
+ "11eef668cf961ebbe4adbb4b38c52f63c6191123",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
- "support"
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html": [
+ "657c7d09ca4ad3faa1c27b4e94c200babd7d61ef",
+ "testharness"
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html": [
- "21f6bd1faaa7942e3ca68592bdf753664f94eff7",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html": [
+ "d8d3a81e2ba15dd2733c1408a935e5b604535517",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
- "support"
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.swap-origin.http.html": [
+ "98c953b11fdcc5ab13a418bed44a39ebff6b285a",
+ "testharness"
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html": [
- "a7054707dc49b7f3c6b44dfc0fe977e923c35271",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/same-https.keep-origin.http.html": [
+ "26c1f00dde2204f950eba5232165ecd10522b8c6",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
- "support"
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/same-https.no-redirect.http.html": [
+ "798f6fc480a50b9ffe555dcff97725affcbdcf53",
+ "testharness"
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html": [
- "62dbdaff92bf0a0151424bdc0183ecc123c61db9",
+ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/same-https.swap-origin.http.html": [
+ "2f861ecf84f58860a07b6eb785b43b3d2cbd5a88",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
- "support"
+ "referrer-policy/gen/top.meta/strict-origin/fetch/cross-http.keep-origin.http.html": [
+ "86a8cf5916aede3dcb156b2c82e64c7d34f1781e",
+ "testharness"
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
- "3877d5bce4f2c550ab74d46be30b7636231aeaec",
+ "referrer-policy/gen/top.meta/strict-origin/fetch/cross-http.no-redirect.http.html": [
+ "7165df9b9a29a19dc24de50bfac7b2f8df410a45",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
- "support"
+ "referrer-policy/gen/top.meta/strict-origin/fetch/cross-http.swap-origin.http.html": [
+ "eac9d1e3e32b60ae4a19b3d8a26a10e834f8e6ce",
+ "testharness"
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html": [
- "b537c0352c1ec175e407b56546b5b3c0c58010a5",
+ "referrer-policy/gen/top.meta/strict-origin/fetch/cross-https.keep-origin.http.html": [
+ "5baa5232bbc26e33d39d89a72ca1590e3091b2dd",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
- "support"
+ "referrer-policy/gen/top.meta/strict-origin/fetch/cross-https.no-redirect.http.html": [
+ "386451d9d506687e63c3757ea771767729bf6d35",
+ "testharness"
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html": [
- "0881853070c54031398ca6fe72cc758689323e05",
+ "referrer-policy/gen/top.meta/strict-origin/fetch/cross-https.swap-origin.http.html": [
+ "0ff2d30e0a3b75b88de6d5f687a82d363e50cc90",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
- "support"
+ "referrer-policy/gen/top.meta/strict-origin/fetch/same-http.keep-origin.http.html": [
+ "698db2d282fa6350c84a681d058cbe70453e23d6",
+ "testharness"
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html": [
- "390e5a114d0444a898b9de7e778156dba96bd530",
+ "referrer-policy/gen/top.meta/strict-origin/fetch/same-http.no-redirect.http.html": [
+ "8db97af5364fa64efb1879abb1c11539701e951d",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
- "support"
+ "referrer-policy/gen/top.meta/strict-origin/fetch/same-http.swap-origin.http.html": [
+ "e86ce77b4a800781c0909e2645ccf1f9b80071c1",
+ "testharness"
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "21ec099f4cf197b93a1c08e033bd0572922fdeee",
+ "referrer-policy/gen/top.meta/strict-origin/fetch/same-https.keep-origin.http.html": [
+ "2e486d4b7dc5d300b0ba1122c3d0df069e258571",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
- "support"
+ "referrer-policy/gen/top.meta/strict-origin/fetch/same-https.no-redirect.http.html": [
+ "940d3b30e4217e5af1a436455b202ce5437a4930",
+ "testharness"
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html": [
- "9c05e66587adada8b50ec5597f2a82d19be57a9b",
+ "referrer-policy/gen/top.meta/strict-origin/fetch/same-https.swap-origin.http.html": [
+ "c33feb0e35f3bb1da9c37897ed7f7ff3d49e8bb5",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
- "support"
+ "referrer-policy/gen/top.meta/strict-origin/iframe-tag/cross-http.keep-origin.http.html": [
+ "3107b816c5bed6b17727b2d63b0c1a7537a32111",
+ "testharness"
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "2bba3d1b95809764f91de476020b39ca0e4a716a",
+ "referrer-policy/gen/top.meta/strict-origin/iframe-tag/cross-http.no-redirect.http.html": [
+ "0bdc08686310ef0c354916412c58c79a7b95f1d0",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
- "support"
+ "referrer-policy/gen/top.meta/strict-origin/iframe-tag/cross-http.swap-origin.http.html": [
+ "6b63d1831ff11bd991dc0400d4e942dcd7c8336a",
+ "testharness"
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "4e46c27514d5dd3e28bcb830a634a8c824ba7a11",
+ "referrer-policy/gen/top.meta/strict-origin/iframe-tag/cross-https.keep-origin.http.html": [
+ "0ffbbb95fc532f2fdca7560bf2cd3957c73ba0c5",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
- "support"
+ "referrer-policy/gen/top.meta/strict-origin/iframe-tag/cross-https.no-redirect.http.html": [
+ "0ccfc472390a818061178769d86f06c955a618c1",
+ "testharness"
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
- "43b78c36946e2506b47ec60d26595304a555c8c7",
+ "referrer-policy/gen/top.meta/strict-origin/iframe-tag/cross-https.swap-origin.http.html": [
+ "d6c376a4e65b9dcd5a8f8874bdd1c1087a0e3287",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
- "support"
+ "referrer-policy/gen/top.meta/strict-origin/iframe-tag/same-http.keep-origin.http.html": [
+ "2d40b45cc0038d4b53ce7917e42b738127d37016",
+ "testharness"
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "745f65c04883c123f7dd0a86e4781435888168af",
+ "referrer-policy/gen/top.meta/strict-origin/iframe-tag/same-http.no-redirect.http.html": [
+ "f7f02844de2bf8a20ac416982882cdc2afbbdad4",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
- "support"
+ "referrer-policy/gen/top.meta/strict-origin/iframe-tag/same-http.swap-origin.http.html": [
+ "3bd77a1c6330a4c3f1a64b513ec0109f07378b1d",
+ "testharness"
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "e503b77b05c71dfe64fa5a874e1132e4ba367df6",
+ "referrer-policy/gen/top.meta/strict-origin/iframe-tag/same-https.keep-origin.http.html": [
+ "ae494dbee4926858e455c781abeccb6c4234a6a6",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
- "support"
+ "referrer-policy/gen/top.meta/strict-origin/iframe-tag/same-https.no-redirect.http.html": [
+ "8d9b5f4d3d95c2376fecdeb8c6b326b13f89e0cf",
+ "testharness"
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html": [
- "9067040bb8622050bb11aa1919251e4063e4f2bb",
+ "referrer-policy/gen/top.meta/strict-origin/iframe-tag/same-https.swap-origin.http.html": [
+ "0abed4587638b8a9cff2d390068cc2774f0831e8",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
- "support"
+ "referrer-policy/gen/top.meta/strict-origin/script-tag/cross-http.keep-origin.http.html": [
+ "eaf16c30210357a1848c014c0a772429d78474d4",
+ "testharness"
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "7b2f46326a302c1d10c304178e399773d07dc4b4",
+ "referrer-policy/gen/top.meta/strict-origin/script-tag/cross-http.no-redirect.http.html": [
+ "1488f50aff803cbd2d89cf496bd3f7ec4b8247c2",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
- "support"
+ "referrer-policy/gen/top.meta/strict-origin/script-tag/cross-http.swap-origin.http.html": [
+ "b61faea974ae74efcea2ff1e3234960811b1ee90",
+ "testharness"
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html": [
- "e471c1fb03069882b4de35f86ac196a53dcd0f9b",
+ "referrer-policy/gen/top.meta/strict-origin/script-tag/cross-https.keep-origin.http.html": [
+ "4bf90c5726955b0b8e3018c90e4f9fec34b33a00",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
- "support"
+ "referrer-policy/gen/top.meta/strict-origin/script-tag/cross-https.no-redirect.http.html": [
+ "eba80e2a1efb1e8dc6cc40ce90d1cb9cadb02fa9",
+ "testharness"
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html": [
- "dda3d2fb493e73e2541f012c4af51550d59b9bd2",
+ "referrer-policy/gen/top.meta/strict-origin/script-tag/cross-https.swap-origin.http.html": [
+ "b38f5ba075ede9680644128637b2ade62130b9e4",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
- "support"
+ "referrer-policy/gen/top.meta/strict-origin/script-tag/same-http.keep-origin.http.html": [
+ "63bcd9f654cfcfbce720649cda4f3e725a3bbe9a",
+ "testharness"
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html": [
- "5e3c7911cd73b6066983927852d0eb328161e305",
+ "referrer-policy/gen/top.meta/strict-origin/script-tag/same-http.no-redirect.http.html": [
+ "432125bc00526e0810f67afeb1728240fa79c47d",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
- "support"
+ "referrer-policy/gen/top.meta/strict-origin/script-tag/same-http.swap-origin.http.html": [
+ "c47194b15ef4b8b9005c9a25ec517be28a83c2b1",
+ "testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html": [
- "3449a347dca51f652a994af3db05e877f705f2ac",
+ "referrer-policy/gen/top.meta/strict-origin/script-tag/same-https.keep-origin.http.html": [
+ "bf42bba75f230ddef3ce515a9ee6f92d0fcd38af",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
- "support"
+ "referrer-policy/gen/top.meta/strict-origin/script-tag/same-https.no-redirect.http.html": [
+ "a7195a0f8f2389a11771fcdb1b7d810c76803dfd",
+ "testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html": [
- "d68b3f0d60b9f137047dfbc48af0e6f9a09ae61f",
+ "referrer-policy/gen/top.meta/strict-origin/script-tag/same-https.swap-origin.http.html": [
+ "b4119eb7c42add564e78fff3868cf63372aa11a2",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
- "support"
+ "referrer-policy/gen/top.meta/strict-origin/sharedworker-classic/same-http.keep-origin.http.html": [
+ "6b00a6bd35a505706b2a9d6d2861e4e67c5defaf",
+ "testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html": [
- "0d32296e8fd1391e1223d9315efdc21d30935a5c",
+ "referrer-policy/gen/top.meta/strict-origin/sharedworker-classic/same-http.no-redirect.http.html": [
+ "3d57f36d4793cd1c1b0bb92798d32c9b241fae66",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
- "support"
+ "referrer-policy/gen/top.meta/strict-origin/worker-classic/same-http.keep-origin.http.html": [
+ "8360ff528ad9ba2bb53720c71692d9582aefe000",
+ "testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html": [
- "e0fe2ed9ecaab4378e4309328283c655af085ccf",
+ "referrer-policy/gen/top.meta/strict-origin/worker-classic/same-http.no-redirect.http.html": [
+ "35243d8c0dfad93ee7aa55e083c8600eeccaff00",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
- "support"
+ "referrer-policy/gen/top.meta/strict-origin/worker-module/same-http.keep-origin.http.html": [
+ "5292a9f479b27c8d897db580722487b6c3b6f83b",
+ "testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html": [
- "5a66aa2ca700aecaec7fc41b9546e71987d829d8",
+ "referrer-policy/gen/top.meta/strict-origin/worker-module/same-http.no-redirect.http.html": [
+ "9f6cb30717fce29b903de0b4d5ed21a6b0e831aa",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
- "support"
+ "referrer-policy/gen/top.meta/strict-origin/xhr/cross-http.keep-origin.http.html": [
+ "20be1ee2d82239f79459171c6e6438dad45254b4",
+ "testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html": [
- "228473d37a404376a6dcc5e5e8fe12b6ae4798c7",
+ "referrer-policy/gen/top.meta/strict-origin/xhr/cross-http.no-redirect.http.html": [
+ "fd280355417e02626fadddf411aadf989ed494eb",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
- "support"
+ "referrer-policy/gen/top.meta/strict-origin/xhr/cross-http.swap-origin.http.html": [
+ "878d1b0c28decf0553142e39fd672d3d08244e62",
+ "testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html": [
- "556a260ea63ccb66e1f2bec2faab32f8ce50c0b6",
+ "referrer-policy/gen/top.meta/strict-origin/xhr/cross-https.keep-origin.http.html": [
+ "5511aa6d54fed581ac9805af17b89bab5d362f97",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
- "support"
+ "referrer-policy/gen/top.meta/strict-origin/xhr/cross-https.no-redirect.http.html": [
+ "ff0984afa87f0bec4a1e226b74e5bfa5cf86945d",
+ "testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html": [
- "e9f49f4ed9a67a4a7d0a96cd9daceea6367c95ee",
+ "referrer-policy/gen/top.meta/strict-origin/xhr/cross-https.swap-origin.http.html": [
+ "6381e3025fda11d8a001c1592744811237ab4872",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
- "support"
+ "referrer-policy/gen/top.meta/strict-origin/xhr/same-http.keep-origin.http.html": [
+ "236eab003ffe9a1bede6ee662e965bcc8b8fe645",
+ "testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html": [
- "e225adb44b66f6a1d43c8d1015cfd68e92ef2c14",
+ "referrer-policy/gen/top.meta/strict-origin/xhr/same-http.no-redirect.http.html": [
+ "c47edfd188140a44375dc1e6f7a322c2fa3cfb3c",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
- "support"
+ "referrer-policy/gen/top.meta/strict-origin/xhr/same-http.swap-origin.http.html": [
+ "5f4e9a08c8300af2cd2cde30cb77f0d46112970f",
+ "testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html": [
- "a2a97e73d1e6481ef87ad68d7e8d7a2742f0a1ec",
+ "referrer-policy/gen/top.meta/strict-origin/xhr/same-https.keep-origin.http.html": [
+ "28192674c920d5ecc217e704ad6cafeb1e322347",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
- "support"
+ "referrer-policy/gen/top.meta/strict-origin/xhr/same-https.no-redirect.http.html": [
+ "02c868a4672324816ba681a69de3f0a97dc41845",
+ "testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/insecure-protocol.http.html": [
- "eae326f66c1a7127351a8efd952e4a5a1cf622d3",
+ "referrer-policy/gen/top.meta/strict-origin/xhr/same-https.swap-origin.http.html": [
+ "20f964044e23c3da3617b862e57b1c8b73dfa0b0",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/insecure-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
- "support"
+ "referrer-policy/gen/top.meta/unsafe-url/fetch/cross-http.keep-origin.http.html": [
+ "383a91559b3aae9937feccf2aeefc290db9efef3",
+ "testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/module-worker/no-redirect/insecure-protocol.http.html": [
- "870b555c7b4a90c539871ca723223fe7dbcbed18",
+ "referrer-policy/gen/top.meta/unsafe-url/fetch/cross-http.no-redirect.http.html": [
+ "3a7df294f9a3074d18b36b0c12b23585d00dde7d",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/module-worker/no-redirect/insecure-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
- "support"
+ "referrer-policy/gen/top.meta/unsafe-url/fetch/cross-http.swap-origin.http.html": [
+ "557684095b16492465a31b7e542d50d79f5d8e18",
+ "testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html": [
- "92186b3831859d4790934a416d90969e276cdb03",
+ "referrer-policy/gen/top.meta/unsafe-url/fetch/cross-https.keep-origin.http.html": [
+ "85a20c12d9752c08187e902d375c9d1512a896bb",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
- "support"
+ "referrer-policy/gen/top.meta/unsafe-url/fetch/cross-https.no-redirect.http.html": [
+ "0c058c0832fd8633165f270308cd7a3d8ef8f823",
+ "testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html": [
- "924ebe5e76c09cc21653daa2aad2761424feb3af",
+ "referrer-policy/gen/top.meta/unsafe-url/fetch/cross-https.swap-origin.http.html": [
+ "91884c7afe6e31dec7a601fe507a0716c9832385",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
- "support"
+ "referrer-policy/gen/top.meta/unsafe-url/fetch/same-http.keep-origin.http.html": [
+ "ad39013c5f340b9fe255f811c4731a74048305a2",
+ "testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html": [
- "8e374ad73ae7a89a638277ec6673fbaec28c5f49",
+ "referrer-policy/gen/top.meta/unsafe-url/fetch/same-http.no-redirect.http.html": [
+ "2bc73e76e68b2d8475b818d7a452b1726956723f",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
- "support"
+ "referrer-policy/gen/top.meta/unsafe-url/fetch/same-http.swap-origin.http.html": [
+ "7a69b5297890c8881109eb29e91086ec1c7ff4c5",
+ "testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/insecure-protocol.http.html": [
- "698ba1f52dcf16df370f74479624d6ecbb2485cd",
+ "referrer-policy/gen/top.meta/unsafe-url/fetch/same-https.keep-origin.http.html": [
+ "4cda477b772c90dac479da81d32ac927ca2197ec",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/insecure-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
- "support"
+ "referrer-policy/gen/top.meta/unsafe-url/fetch/same-https.no-redirect.http.html": [
+ "ed261048b3801a4d8f91d2328f8ed98a30cf784c",
+ "testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/shared-worker/no-redirect/insecure-protocol.http.html": [
- "c3eead4ac0ceb0a2447734d52365928daeb949fa",
+ "referrer-policy/gen/top.meta/unsafe-url/fetch/same-https.swap-origin.http.html": [
+ "cb5bcf637be9f75e10354da6b64dd4a6293bc3be",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/shared-worker/no-redirect/insecure-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
- "support"
+ "referrer-policy/gen/top.meta/unsafe-url/iframe-tag/cross-http.keep-origin.http.html": [
+ "5e9376358b9b4a3d5cbf6eaea61ecf298bcebdda",
+ "testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/insecure-protocol.http.html": [
- "b1c1f720a14e75c34fe82b3fd647241f86ad3137",
+ "referrer-policy/gen/top.meta/unsafe-url/iframe-tag/cross-http.no-redirect.http.html": [
+ "50532da8910378c3b29c7bd520ac5f173448aee3",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/insecure-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
- "support"
+ "referrer-policy/gen/top.meta/unsafe-url/iframe-tag/cross-http.swap-origin.http.html": [
+ "4a6fbf0d03a627d4c82e58b296b00c05243cb67a",
+ "testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/worker-request/no-redirect/insecure-protocol.http.html": [
- "f0082510aaf9867fb2b4d4f36a5a00f9a4107553",
+ "referrer-policy/gen/top.meta/unsafe-url/iframe-tag/cross-https.keep-origin.http.html": [
+ "f20be36ad1c27a26e3e33682241cfa6bd7c2f114",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/worker-request/no-redirect/insecure-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
- "support"
+ "referrer-policy/gen/top.meta/unsafe-url/iframe-tag/cross-https.no-redirect.http.html": [
+ "1925370c86b81049450b15ca6cd3196fea3d2a70",
+ "testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html": [
- "dbb8da1e03c956fbaed72688e090e80d3bc33ff9",
+ "referrer-policy/gen/top.meta/unsafe-url/iframe-tag/cross-https.swap-origin.http.html": [
+ "4474708caacaeac71ccc7da1135414ae22699cce",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
- "support"
+ "referrer-policy/gen/top.meta/unsafe-url/iframe-tag/same-http.keep-origin.http.html": [
+ "ac6bcec6450393d369327033ac83b2092cd8d7a7",
+ "testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html": [
- "09aeb8fc143e6d5df4fbf362dc07db6c1e4f25e1",
+ "referrer-policy/gen/top.meta/unsafe-url/iframe-tag/same-http.no-redirect.http.html": [
+ "a6364188266e3f29f2ff6bd9115dbc1ef41d361d",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
- "support"
+ "referrer-policy/gen/top.meta/unsafe-url/iframe-tag/same-http.swap-origin.http.html": [
+ "4b7889385bee894026736f7329490a72d16510d9",
+ "testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html": [
- "e2f73ada79c33932dc87aee17a81deceb1ff2e56",
+ "referrer-policy/gen/top.meta/unsafe-url/iframe-tag/same-https.keep-origin.http.html": [
+ "0bbc78707db66389124272c8983a00e706566e2f",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
- "support"
+ "referrer-policy/gen/top.meta/unsafe-url/iframe-tag/same-https.no-redirect.http.html": [
+ "63d3c37d89a560bfb82cfa3cf44cf65d5c2d25b9",
+ "testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
- "fb86bc5c45fa86aea0caa61611cc63dadabfea7d",
+ "referrer-policy/gen/top.meta/unsafe-url/iframe-tag/same-https.swap-origin.http.html": [
+ "af08f36ef37e872dba30338eeccd4a5a42cf6b31",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
- "support"
+ "referrer-policy/gen/top.meta/unsafe-url/script-tag/cross-http.keep-origin.http.html": [
+ "95b58fa5d651248048f5edd519a1a99db973f9ab",
+ "testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html": [
- "637f7d801961f4351d3eeb0a92b498007ff766d3",
+ "referrer-policy/gen/top.meta/unsafe-url/script-tag/cross-http.no-redirect.http.html": [
+ "f70dab3d46abfec6a251bca7061b2687e4d0e5f2",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
- "support"
+ "referrer-policy/gen/top.meta/unsafe-url/script-tag/cross-http.swap-origin.http.html": [
+ "e5dbfb16d0d4c13c946faafbc5798b78235252ca",
+ "testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html": [
- "649574394f1259b62aa93c5eb7d376009a4f3111",
+ "referrer-policy/gen/top.meta/unsafe-url/script-tag/cross-https.keep-origin.http.html": [
+ "b740b81c25802a88402b4d780b10901aed98359f",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
- "support"
+ "referrer-policy/gen/top.meta/unsafe-url/script-tag/cross-https.no-redirect.http.html": [
+ "dcc34b6ef19659e5a6b243d5af22718c03820683",
+ "testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html": [
- "1bb79c1f38afa280cd1193734bfdcca3f63938bd",
+ "referrer-policy/gen/top.meta/unsafe-url/script-tag/cross-https.swap-origin.http.html": [
+ "bc7ee4cce9b4e34368746cd62859dfd1fd7d35cb",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
- "support"
+ "referrer-policy/gen/top.meta/unsafe-url/script-tag/same-http.keep-origin.http.html": [
+ "052c6cf287bba3b35e5973057252627580aa1d00",
+ "testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "a9053cc0649c374c5c00dfc830ede7c2627a4dfe",
+ "referrer-policy/gen/top.meta/unsafe-url/script-tag/same-http.no-redirect.http.html": [
+ "acd64f240b9458eda751ea324b511181879462d9",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
- "support"
+ "referrer-policy/gen/top.meta/unsafe-url/script-tag/same-http.swap-origin.http.html": [
+ "5553fe06a0a1489c7ecda14b99b96eb37e872756",
+ "testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html": [
- "c7536fc50807828021f58f58fcdb94b0baab4848",
+ "referrer-policy/gen/top.meta/unsafe-url/script-tag/same-https.keep-origin.http.html": [
+ "ed63b00877cfa77bf3512221067edd87dafcabb1",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
- "support"
+ "referrer-policy/gen/top.meta/unsafe-url/script-tag/same-https.no-redirect.http.html": [
+ "9dd6c3b3b52e041dc9d35fd9e805693aeaca47aa",
+ "testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "b27ed1830b6174ff7f372485c48bb866eb4a26c8",
+ "referrer-policy/gen/top.meta/unsafe-url/script-tag/same-https.swap-origin.http.html": [
+ "d46b65c5d6ed487c1ca7a8e0a3b3face4ffbd786",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
- "support"
+ "referrer-policy/gen/top.meta/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html": [
+ "04c02ae47efb6ac4945f3b011587a904cc98d203",
+ "testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "39a7b701c33ef86a4ef2c8843654032132469828",
+ "referrer-policy/gen/top.meta/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html": [
+ "83b4baf0bb3f165fa43698c38679cedbba6c06a1",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
- "support"
+ "referrer-policy/gen/top.meta/unsafe-url/worker-classic/same-http.keep-origin.http.html": [
+ "bcaf210bc4ab48791e4fee5bf383e165c78aa911",
+ "testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
- "27f637f8447dde6cd24378d3e0799876e8d79241",
+ "referrer-policy/gen/top.meta/unsafe-url/worker-classic/same-http.no-redirect.http.html": [
+ "7f3fd250721b3fa6b545fe316c62bcdef346bbd8",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
- "support"
+ "referrer-policy/gen/top.meta/unsafe-url/worker-module/same-http.keep-origin.http.html": [
+ "01bc2a61fae0190ba34b1b7ca01980dfa8bd87c1",
+ "testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "3c11a22da1c4e7c3eacddde233b7b763701bc550",
+ "referrer-policy/gen/top.meta/unsafe-url/worker-module/same-http.no-redirect.http.html": [
+ "5af7f8fc21ade640000423a854a1cfeca4868a3b",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
- "support"
+ "referrer-policy/gen/top.meta/unsafe-url/xhr/cross-http.keep-origin.http.html": [
+ "77aaa8793129bee4ae171936392a16476e027612",
+ "testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "b02da368869d034ed36e33d9b33dfc427bf02522",
+ "referrer-policy/gen/top.meta/unsafe-url/xhr/cross-http.no-redirect.http.html": [
+ "6e1b01962179d6a145bd74bb959eb0fda7294786",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
+ "referrer-policy/gen/top.meta/unsafe-url/xhr/cross-http.swap-origin.http.html": [
+ "bb955ba76566e5fa915314ef65b4c921980fc65e",
+ "testharness"
+ ],
+ "referrer-policy/gen/top.meta/unsafe-url/xhr/cross-https.keep-origin.http.html": [
+ "21f65dedfd353406e9551ab493e72cd6b0ca0950",
+ "testharness"
+ ],
+ "referrer-policy/gen/top.meta/unsafe-url/xhr/cross-https.no-redirect.http.html": [
+ "b19fa390d20d151a0d137dc567612ed36ca6bbc1",
+ "testharness"
+ ],
+ "referrer-policy/gen/top.meta/unsafe-url/xhr/cross-https.swap-origin.http.html": [
+ "43fa7e0286e01ad71bdd9f07332b853d73eaab01",
+ "testharness"
+ ],
+ "referrer-policy/gen/top.meta/unsafe-url/xhr/same-http.keep-origin.http.html": [
+ "69d157e43a95add0742f3a85e16e810698efaa52",
+ "testharness"
+ ],
+ "referrer-policy/gen/top.meta/unsafe-url/xhr/same-http.no-redirect.http.html": [
+ "f481905747b10d664e3d318ad69408d60dceced6",
+ "testharness"
+ ],
+ "referrer-policy/gen/top.meta/unsafe-url/xhr/same-http.swap-origin.http.html": [
+ "b359aeeb63f460eb9cc9c5e41adf74914129f2da",
+ "testharness"
+ ],
+ "referrer-policy/gen/top.meta/unsafe-url/xhr/same-https.keep-origin.http.html": [
+ "eb14cf0a1959407d5e95f13ec50bfb170a8888e3",
+ "testharness"
+ ],
+ "referrer-policy/gen/top.meta/unsafe-url/xhr/same-https.no-redirect.http.html": [
+ "d46b4cd5c2a00970222959fd83df4e0f172d2ef4",
+ "testharness"
+ ],
+ "referrer-policy/gen/top.meta/unsafe-url/xhr/same-https.swap-origin.http.html": [
+ "189c6bc5144eefa32fddc7b57f58e575e6a8aaad",
+ "testharness"
+ ],
+ "referrer-policy/gen/top.meta/unset/fetch/cross-http.keep-origin.http.html": [
+ "ea2e8d1194859594c01f573e3f3ce5818566a9cf",
+ "testharness"
+ ],
+ "referrer-policy/gen/top.meta/unset/fetch/cross-http.no-redirect.http.html": [
+ "2cfe2a0fb99b9b83770be5ea0347887437cab561",
+ "testharness"
+ ],
+ "referrer-policy/gen/top.meta/unset/fetch/cross-http.swap-origin.http.html": [
+ "44501a5f736380a6c6a3e879bddfbf8aa6f4f90f",
+ "testharness"
+ ],
+ "referrer-policy/gen/top.meta/unset/fetch/cross-https.keep-origin.http.html": [
+ "9f51a70045663262f724914650eeb93b92551a7d",
+ "testharness"
+ ],
+ "referrer-policy/gen/top.meta/unset/fetch/cross-https.no-redirect.http.html": [
+ "b16692f66d4ad8094cff6c778242afaf819cedc5",
+ "testharness"
+ ],
+ "referrer-policy/gen/top.meta/unset/fetch/cross-https.swap-origin.http.html": [
+ "532809dd0afa8fa7cf20e93572ffe3068482a768",
+ "testharness"
+ ],
+ "referrer-policy/gen/top.meta/unset/fetch/same-http.keep-origin.http.html": [
+ "99882a623ccd727407e4fadb666994f615afb93b",
+ "testharness"
+ ],
+ "referrer-policy/gen/top.meta/unset/fetch/same-http.no-redirect.http.html": [
+ "aae08809fa202d2d0dafd7fb8b11802f56b14dab",
+ "testharness"
+ ],
+ "referrer-policy/gen/top.meta/unset/fetch/same-http.swap-origin.http.html": [
+ "b8dbbd6e029ff40110d6d30bfd013201edea9b6f",
+ "testharness"
+ ],
+ "referrer-policy/gen/top.meta/unset/fetch/same-https.keep-origin.http.html": [
+ "5480d46ff3f05aa804e2386c755d0afe3fd2ee49",
+ "testharness"
+ ],
+ "referrer-policy/gen/top.meta/unset/fetch/same-https.no-redirect.http.html": [
+ "0edaa41c1c8237df53d6c4e2cfe3654aa0b36d2b",
+ "testharness"
+ ],
+ "referrer-policy/gen/top.meta/unset/fetch/same-https.swap-origin.http.html": [
+ "2bcb3cbe6ec3e8f8102f8a5eb4e4a92e53f91476",
+ "testharness"
+ ],
+ "referrer-policy/gen/top.meta/unset/iframe-tag/cross-http.keep-origin.http.html": [
+ "97ec687004a41a5aeb3d8d7d06c3a3e5a36db20b",
+ "testharness"
+ ],
+ "referrer-policy/gen/top.meta/unset/iframe-tag/cross-http.no-redirect.http.html": [
+ "d631a6dcb12fcdac7bd6cac94b67893203ae805c",
+ "testharness"
+ ],
+ "referrer-policy/gen/top.meta/unset/iframe-tag/cross-http.swap-origin.http.html": [
+ "2d627c6d22edd82ba71e776c85cd7ff9981f6db0",
+ "testharness"
+ ],
+ "referrer-policy/gen/top.meta/unset/iframe-tag/cross-https.keep-origin.http.html": [
+ "366e8665a62e062ad5d44f079d0585d353a38d9b",
+ "testharness"
+ ],
+ "referrer-policy/gen/top.meta/unset/iframe-tag/cross-https.no-redirect.http.html": [
+ "3a55660c0e48d19afd0101e29b9b7b09013ba7b4",
+ "testharness"
+ ],
+ "referrer-policy/gen/top.meta/unset/iframe-tag/cross-https.swap-origin.http.html": [
+ "9b857831f09986428eea878ff03d33981788d4bb",
+ "testharness"
+ ],
+ "referrer-policy/gen/top.meta/unset/iframe-tag/same-http.keep-origin.http.html": [
+ "d80ff5a58075f7a0cd469da0d9ec0587172316cb",
+ "testharness"
+ ],
+ "referrer-policy/gen/top.meta/unset/iframe-tag/same-http.no-redirect.http.html": [
+ "012d095ef49377e0c7bf2ebc6e12efd8aed5dec4",
+ "testharness"
+ ],
+ "referrer-policy/gen/top.meta/unset/iframe-tag/same-http.swap-origin.http.html": [
+ "f2f4595415a3c912da6fab0b144373651393c91f",
+ "testharness"
+ ],
+ "referrer-policy/gen/top.meta/unset/iframe-tag/same-https.keep-origin.http.html": [
+ "667567ebba11259e988613adc3a040269a927abd",
+ "testharness"
+ ],
+ "referrer-policy/gen/top.meta/unset/iframe-tag/same-https.no-redirect.http.html": [
+ "2824cead304141079f73bedaf9655ed5406d34c2",
+ "testharness"
+ ],
+ "referrer-policy/gen/top.meta/unset/iframe-tag/same-https.swap-origin.http.html": [
+ "9efcc95c2aa98335f7613d6d2e53c2550defe471",
+ "testharness"
+ ],
+ "referrer-policy/gen/top.meta/unset/script-tag/cross-http.keep-origin.http.html": [
+ "e49bb460dbab8b926c3eee0e8e6e0040c6fec870",
+ "testharness"
+ ],
+ "referrer-policy/gen/top.meta/unset/script-tag/cross-http.no-redirect.http.html": [
+ "cc431565cb16ac0042be8eb61b37c02c901b2314",
+ "testharness"
+ ],
+ "referrer-policy/gen/top.meta/unset/script-tag/cross-http.swap-origin.http.html": [
+ "acba24bf6482e9208b25e9fdfedd9d908f00002d",
+ "testharness"
+ ],
+ "referrer-policy/gen/top.meta/unset/script-tag/cross-https.keep-origin.http.html": [
+ "6d335a915c88ebfd502e7a7edec108468ef52ba0",
+ "testharness"
+ ],
+ "referrer-policy/gen/top.meta/unset/script-tag/cross-https.no-redirect.http.html": [
+ "a72d9f9d555eb60ee0e7ebbc9fab32a1d3230fe3",
+ "testharness"
+ ],
+ "referrer-policy/gen/top.meta/unset/script-tag/cross-https.swap-origin.http.html": [
+ "5ae41b8a4757fccb99c9cb44059b34cfc4370da4",
+ "testharness"
+ ],
+ "referrer-policy/gen/top.meta/unset/script-tag/same-http.keep-origin.http.html": [
+ "41d2ffbf3bb9f94ddba57b8f91ff4b6937797ac7",
+ "testharness"
+ ],
+ "referrer-policy/gen/top.meta/unset/script-tag/same-http.no-redirect.http.html": [
+ "c50346186988fd0f38d4c858493c667d658f06bf",
+ "testharness"
+ ],
+ "referrer-policy/gen/top.meta/unset/script-tag/same-http.swap-origin.http.html": [
+ "ccf74bfc9783b89ef645e64dd6b433f2976e4ef4",
+ "testharness"
+ ],
+ "referrer-policy/gen/top.meta/unset/script-tag/same-https.keep-origin.http.html": [
+ "1f3c30737f984e230f66b8951b1efc83602180db",
+ "testharness"
+ ],
+ "referrer-policy/gen/top.meta/unset/script-tag/same-https.no-redirect.http.html": [
+ "8b7f117bd904e95890d417f6dd772dcba17b956b",
+ "testharness"
+ ],
+ "referrer-policy/gen/top.meta/unset/script-tag/same-https.swap-origin.http.html": [
+ "de7ff149fad8eb3705adfd9d32af4066563bc9e6",
+ "testharness"
+ ],
+ "referrer-policy/gen/top.meta/unset/sharedworker-classic/same-http.keep-origin.http.html": [
+ "bf5fbd15347c0589d84cf150d64da32e551b9d6c",
+ "testharness"
+ ],
+ "referrer-policy/gen/top.meta/unset/sharedworker-classic/same-http.no-redirect.http.html": [
+ "019f99b85150aa1da20a9bffefe9fa81338be86d",
+ "testharness"
+ ],
+ "referrer-policy/gen/top.meta/unset/worker-classic/same-http.keep-origin.http.html": [
+ "bb03d60a754c84ee3ec4f530ebc1e2af7230dd08",
+ "testharness"
+ ],
+ "referrer-policy/gen/top.meta/unset/worker-classic/same-http.no-redirect.http.html": [
+ "2647d9c0068ca57d5070a0d503748e4d391a7e9b",
+ "testharness"
+ ],
+ "referrer-policy/gen/top.meta/unset/worker-module/same-http.keep-origin.http.html": [
+ "48e9b2fc797ce1bedab11017c450b4bcdc3b7075",
+ "testharness"
+ ],
+ "referrer-policy/gen/top.meta/unset/worker-module/same-http.no-redirect.http.html": [
+ "c471a2ab65f0027b09a1156a7f9fcba6429c8fac",
+ "testharness"
+ ],
+ "referrer-policy/gen/top.meta/unset/xhr/cross-http.keep-origin.http.html": [
+ "d05cf044d6b27de6fb4b98e67aef5b4ce547298d",
+ "testharness"
+ ],
+ "referrer-policy/gen/top.meta/unset/xhr/cross-http.no-redirect.http.html": [
+ "a46b1806e1d9c4db2f95f0fa58b2b8dad6dd1a62",
+ "testharness"
+ ],
+ "referrer-policy/gen/top.meta/unset/xhr/cross-http.swap-origin.http.html": [
+ "bb3472038d3c63f0eecb5edfbc8f524a812c11d1",
+ "testharness"
+ ],
+ "referrer-policy/gen/top.meta/unset/xhr/cross-https.keep-origin.http.html": [
+ "d7ff137270e823c1a2f2cea7a12bee20beb2ecc9",
+ "testharness"
+ ],
+ "referrer-policy/gen/top.meta/unset/xhr/cross-https.no-redirect.http.html": [
+ "d2fe3e21cd9298d7c3509dff0c9c8f1f8281d37e",
+ "testharness"
+ ],
+ "referrer-policy/gen/top.meta/unset/xhr/cross-https.swap-origin.http.html": [
+ "5646eec59885411e0af515d96f8c34024d2948eb",
+ "testharness"
+ ],
+ "referrer-policy/gen/top.meta/unset/xhr/same-http.keep-origin.http.html": [
+ "67e588307b53ca28c28c9b3e6200b69b1e5f129d",
+ "testharness"
+ ],
+ "referrer-policy/gen/top.meta/unset/xhr/same-http.no-redirect.http.html": [
+ "e165cb1f414143495575599ed9f858f16c1e57b6",
+ "testharness"
+ ],
+ "referrer-policy/gen/top.meta/unset/xhr/same-http.swap-origin.http.html": [
+ "395832acebdd6263ad535224910868beb89cca31",
+ "testharness"
+ ],
+ "referrer-policy/gen/top.meta/unset/xhr/same-https.keep-origin.http.html": [
+ "99224b7cb6b6deff0b505eb90e71434fbc5c8fe8",
+ "testharness"
+ ],
+ "referrer-policy/gen/top.meta/unset/xhr/same-https.no-redirect.http.html": [
+ "a2c89524c97aafcac94308f9517379a90f87a0ca",
+ "testharness"
+ ],
+ "referrer-policy/gen/top.meta/unset/xhr/same-https.swap-origin.http.html": [
+ "d868323f574937678d6a273346d62421c5cee6a9",
+ "testharness"
+ ],
+ "referrer-policy/generic/iframe-src-change.html": [
+ "15202a76a1ea3b7ad8deb35cdb33826414d7a95b",
+ "testharness"
+ ],
+ "referrer-policy/generic/inheritance/iframe-inheritance-data.html": [
+ "06c3c9b0c4bcf4297f903d422110c2de420679e3",
+ "testharness"
+ ],
+ "referrer-policy/generic/inheritance/iframe-inheritance-srcdoc-child.html": [
+ "08acb405c211e4cf84ae6565a84120ad45b0271b",
+ "testharness"
+ ],
+ "referrer-policy/generic/inheritance/iframe-inheritance-srcdoc.html": [
+ "34ea0045b4871d97acc9b9359e7920c7e04d8c59",
+ "testharness"
+ ],
+ "referrer-policy/generic/link-rel-prefetch.html": [
+ "914ddfc4b225d26c675c61ecf623fdebb10e4524",
+ "testharness"
+ ],
+ "referrer-policy/generic/multiple-headers-and-values.html": [
+ "d4826ce8a7ae2b40898a598c36523d9520c54b4c",
+ "testharness"
+ ],
+ "referrer-policy/generic/multiple-headers-and-values.html.headers": [
+ "d1acc2f1d3cbce700865d96937e612c56e075166",
"support"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html": [
- "5f542a4c16c40e41e9de08b57c7408ceeeaea293",
+ "referrer-policy/generic/multiple-headers-combined.html": [
+ "47b59f556614119ee1dfba56e6673a652a725868",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
+ "referrer-policy/generic/multiple-headers-combined.html.headers": [
+ "fc30a2a18627cf0cb485836f8d44f45beca510f2",
"support"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "a5a9a71c2d1293d883bd75fbb4a7d695b3f772f1",
+ "referrer-policy/generic/multiple-headers-one-invalid.html": [
+ "9bd661fe6a247809f1e8b7ee5ccfdcadad0f4edd",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
+ "referrer-policy/generic/multiple-headers-one-invalid.html.headers": [
+ "075219380414598f4535faa973fe69468fc7d37e",
"support"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html": [
- "be363d79516178fa0509bae76c473f7db17a9bcd",
+ "referrer-policy/generic/multiple-headers-one-unknown-token.html": [
+ "7c28a5ada5273d94ac07ca2ec182c06047b9a560",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
+ "referrer-policy/generic/multiple-headers-one-unknown-token.html.headers": [
+ "46feffd705fe0e559b6f80a4a6b7f7bc46b26121",
"support"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html": [
- "04e317062aa1218243689421a31560faf5caf47a",
+ "referrer-policy/generic/multiple-headers.html": [
+ "7f0364f1853f65cb1020af53bbeefcd6f44b0011",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
+ "referrer-policy/generic/multiple-headers.html.headers": [
+ "dd1dd853f2030bac5c036f693a7cf0eca6daba1a",
+ "support"
+ ],
+ "referrer-policy/generic/referrer-policy-test-case.sub.js": [
+ "4722b0b1b8b373d4bc9ae4c7c41912e693dd9d1b",
"support"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html": [
- "3504c73637c8136b79126efd6aa90883e42c2b31",
+ "referrer-policy/generic/sandboxed-iframe-with-opaque-origin.html": [
+ "0e8e5e1306f5f51c17d8a89c92bb86573c3e275e",
"testharness"
],
- "referrer-policy/strict-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html.headers": [
- "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
+ "referrer-policy/generic/sanity-checker.js": [
+ "e296ce93b965b788ea79f2f2b6cff45d5dce55f0",
"support"
],
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html": [
- "597f4092c2f3160e82176f549fb8507c13b7eb17",
+ "referrer-policy/generic/subresource-test/area-navigate.html": [
+ "ad49c0c2efd7ef18070a73caafd9223e1ec3b39d",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html": [
- "2177b2407fbb4483669380b6a65ade6903d381c2",
+ "referrer-policy/generic/subresource-test/attr-referrer-invalid-value.html": [
+ "bfdf1166ce7876c478b4cfcf9dab439d04a7e437",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html": [
- "54b2947dc663bd502e8e6f14bf776705dfbee644",
+ "referrer-policy/generic/subresource-test/fetch-messaging.html": [
+ "2d835274c132591a8edc574ad747e7d103de0659",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html": [
- "94f10a8e9de329b47ef0aa8697d2b2d45c0644be",
+ "referrer-policy/generic/subresource-test/iframe-messaging.html": [
+ "2f97ce4c62a8dc96c886e17b9113ee9b7c021174",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html": [
- "9463f5394adc5383a4794cabce68d5141838827b",
+ "referrer-policy/generic/subresource-test/image-decoding.html": [
+ "97abb153f1fca19eb53c280117120299374b1b6c",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html": [
- "3838698b0a80061e9b32c520cc75e502ec06aca8",
+ "referrer-policy/generic/subresource-test/link-navigate.html": [
+ "e96fd22539829ef2f71053517941eb3a8178d167",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html": [
- "5a1df9c256b35011c07d43587e2dab8a5bbcf218",
+ "referrer-policy/generic/subresource-test/script-messaging.html": [
+ "44c938fa6e1c34b3761ac6a797d2e87a319fc08b",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html": [
- "0fc489100e8d6d74055f7e91e7eca68ffc8318bf",
+ "referrer-policy/generic/subresource-test/worker-messaging.html": [
+ "0612e9965983c4ee696e63be71dcdc31981aa31a",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html": [
- "0028b48d0b7e97f404b3c532864d01671d709286",
+ "referrer-policy/generic/subresource-test/xhr-messaging.html": [
+ "8afbf1db237130d6c8258b755ceac5258f6500fa",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html": [
- "8b2dea1cb62f4d5fd0dfdbe22617e9a9997a4046",
+ "referrer-policy/generic/test-case.sub.js": [
+ "356f8054f6eca86f7e6f651ab1040ad0c39994a9",
+ "support"
+ ],
+ "referrer-policy/generic/tools/__init__.py": [
+ "e69de29bb2d1d6434b8b29ae775ad8c2e48c5391",
+ "support"
+ ],
+ "referrer-policy/generic/tools/clean.py": [
+ "715e1d6ae4b53461a99b3789a5200e4cb6456f4c",
+ "support"
+ ],
+ "referrer-policy/generic/tools/generate.py": [
+ "480603b9bd870d3e1abd577de31f3f6192caa2e8",
+ "support"
+ ],
+ "referrer-policy/generic/tools/regenerate": [
+ "e6bd63519b331b3a921755445f6895e39f7864f5",
+ "support"
+ ],
+ "referrer-policy/generic/unsupported-csp-referrer-directive.html": [
+ "0a29f38c0288c34c23eea14a6053d68d6b19582e",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html": [
- "71a0b692afbbb185d6710872ef178de5987c6135",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html": [
+ "ea712646bb16025d8bf0e40aa98104a490a7065e",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html": [
- "48861eb9bb785ed17c38fd4c52c5979d197b702a",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "cfc379c0534522e175ff0326f9aafe72d4e49d2e",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html": [
- "c63d9a1608c133f0ab7b0556d4ed4d254b2c7438",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html": [
+ "0d592b59d40b62543de7b7d2d25d55817f0bdc17",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html": [
- "e2143e1a32037aca1eb75e166eff3e2b73f36f36",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "8d108c74608fad1c9765c5d6284bad72e54275b5",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html": [
- "b8d84f7726cd1e40545a377fe0affe4f2be5e7c6",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "8a3731927e0f015697c5b56248a63c7345d2d195",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html": [
- "4f36a9cb35765d01bccae61046ba0c77bf6e68f6",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html": [
+ "463728a4ecd9cd592090b5be6648bf2d13251d54",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
- "c43e52e9dfb1b4301b6d275836c44aa5af0dbb8e",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "d5275be0409ea79c947503e825ccf11fe1912295",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html": [
- "8edd239db2f7622347fd03c635ba5874efb5a553",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "21ea496ca4911832d4fd62afdde6470fb5e90b9e",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html": [
- "873b26a46eb6da2648a7aa64e4a5a094cfa68f96",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html": [
+ "c54ac62bfe9fccdb76c7897bf2b3d6d85207e322",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html": [
- "f0d5c81eca2a4821352a66413f99725c4a000104",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "cdcc134dedfdc84dce7975df662466bc56115032",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "c985a4045448d0fa601b84040be702c1cec8e3ee",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
+ "43435ff17b2900b564d7cae86b35a47752eb279e",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html": [
- "9881576a69bd2a3853a1a4c120d55e3e3bddacd4",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "61b962276bb7fca9cdb6f247cbf6e691210015c3",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "203c5e73cbedd6f95b3afd8ea8a113ecd23717a2",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html": [
+ "0ac4282fb4175860d7beb8256437bc9bcd32b4ad",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "41025c58578ab4aad59c0173077e560d0269f193",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "ad75a53979dcf904fdbf20858080192491feeb55",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
- "ada714dcc5088fd580daf2b5cc12e5a71233d7a7",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "0cfaedb10bfc4488d1c3824ede8de6ecd8bd81c4",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "a574b1304117a6caeea002855820764dbbca9d45",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
+ "3ef49b93f0f6fb0101e1ecb94d1cfc42a3b15986",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "20a3252bf2ff47dc3d8420618259cf819a1a0f29",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "a060a3bcfe270df9b3da7b9cb2c50ea9b90aaf04",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html": [
- "d48173ffeccb3c1d43e6ff057b8c5c7ec575bcc3",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "deb4132ab084ba1f8f0db78ca192c189de3bf7f9",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "c5a1548b12dbeb0a6c20b954058e82aed432d08b",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html": [
+ "793166af730eab51f8c8fe58f33352c7495c5312",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html": [
- "0ee367c9316bc5bc49ede92b77140f923a6c4128",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "1737e72548c1378be77074d8d4cfc4307bdeadba",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html": [
- "3e6c3a175f1a8281ba7af4aa42ff0f8fe07ce145",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html": [
+ "57fb4a946c1897e61efd7160ef7b64a58296bdae",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html": [
- "533a22a72414151feda1aa621ed9c4e2dda02fd3",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "c64034d2bbd16777ac5d20b18ae662ab59d3d984",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html": [
- "335ff468d905ee397358dc7caab8dff492ce164f",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html": [
+ "387f84c09bae3a8644ef28b0cb3db7734047b7c3",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html": [
- "32aab01443482fbcb3e450f68b80e5d6fabd22b3",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "4d0c946bd7a58083be4fe854cfdcb1e7e6455705",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html": [
- "a92d87e2782fcfe6b39cc7826055ed956a80bab7",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "9c769ba10d952c874289c5a7b0dce4757f201a1e",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html": [
- "6f9417785ff9e3b4f7bc0359f26b534b44dc5bae",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html": [
+ "2b1ee01973e73e5ffb1ccae3229e22d98b9f673e",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html": [
- "ad8d9e7f1901d4e04d4166cd1ff37016f1260b38",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "42665670f5bb6de4d020e40aab5dea56940d332c",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html": [
- "a218fb4980df724234814766a59eae7b8bfabad0",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "fa0accb2c068094a4d718f9d21b69b145072c770",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html": [
- "f3fed6c88b8da176db1c51208c2bb4eddb33b2e0",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html": [
+ "59d852294b20500d5facf71ca8f112106a0539b9",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html": [
- "3675e2391e4e72c154db32767af24039b396b70d",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "e1b79bca8050de32a3a38ef93a89cbe42b9d6206",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html": [
- "a94bdfa5d530d9916519262cb89aef7a1e82626a",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
+ "f0d321a52cf5a0c3c12589701b0c1bf55db97e48",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html": [
- "623f6a6e81aa33df2fb6d12a7df7bcb353c91c99",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "ceeaba32d598ec2d4ac74c2e59268b9fdf6d59e8",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/module-worker/keep-origin-redirect/insecure-protocol.http.html": [
- "a991f0c67578b92097dbde29f508336196fd6380",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html": [
+ "59322a856e01b891454f4b97b182e9cd217766b8",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/module-worker/no-redirect/insecure-protocol.http.html": [
- "1546f57a7df782c749d7fdb0c7775f73f1bfb04f",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "ea8dcab7c7d3cbcda26f73eba6059a28a1085251",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html": [
- "3877c0cbaa250e29e6408f369fe638265ec94213",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "5aa80479004486ae33c3b9cc0421db7f18608494",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html": [
- "8542943aabe20b6df7979e467ed86519b0351aff",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
+ "df88f442fab55c2c019ea63aa679328370cb9fd2",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html": [
- "f688eda4732690360b8dc44ea6a2d0c227b3026a",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "8ffbd3a852caff1dbefbd463a45d5d47dbc77fab",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/shared-worker/keep-origin-redirect/insecure-protocol.http.html": [
- "aefc8786e2c2abef050f2a19ff4a5f44214f1d0a",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "455efc4ae70503796438569eeb318d2ff1c1ee95",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/shared-worker/no-redirect/insecure-protocol.http.html": [
- "107e1ca1a6701ee92c5d12019e7b99dfff4d6774",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html": [
+ "89da6893a20e9b5957c0ee09b15a8d6172362cc6",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/worker-request/keep-origin-redirect/insecure-protocol.http.html": [
- "2b4472d3554859a7a89dfb385520e2579493a752",
+ "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "6b29a191efeddb78168ad7a1cbf4d1c5ceff38de",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/worker-request/no-redirect/insecure-protocol.http.html": [
- "5889d9e90f272193f08f953e754d3d0bfa4391eb",
+ "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html": [
+ "eedf34f796da2a92801d91c3d4b2504a5f42983a",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html": [
- "2edd19df54f2ba7ec289f473370a740acf9614b8",
+ "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html.headers": [
+ "f2152da955f3295aec2ac05adc2357ac7629cf7b",
+ "support"
+ ],
+ "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
+ "7a78d49b6411187729cb7b7d9a6a9e4780d3a7ae",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html": [
- "418e84a8210e0bf490396dbfadba00e600fa3a7e",
+ "referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html.headers": [
+ "f2152da955f3295aec2ac05adc2357ac7629cf7b",
+ "support"
+ ],
+ "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html": [
+ "0fc1d169c9a22a0f2d585dccd36536463ae34730",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html": [
- "d46cf842c631c894a8ecbc2ce7db778fd8376bc4",
+ "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html.headers": [
+ "f2152da955f3295aec2ac05adc2357ac7629cf7b",
+ "support"
+ ],
+ "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
+ "93479418ab5901ffe893b8c15d543834dc636e61",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
- "0e40587a04020bb8526448e5649b5ff179b612c2",
+ "referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html.headers": [
+ "f2152da955f3295aec2ac05adc2357ac7629cf7b",
+ "support"
+ ],
+ "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html": [
+ "14d891c6ca0a6fafb699ab3f41111d1327507838",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html": [
- "538500ad734f51dbfae7bcc300a48298d91319e9",
+ "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "f6755e99add4f8a615fa20645d01de2511c82563",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html": [
- "58da77e1a2916fa04f1dfddee6564088c4e1bcd5",
+ "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html": [
+ "9ee1de48295f458eba00147cb56171c95e16c428",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html": [
- "85dab619c2b1a7ff169112c059b44f1537483b24",
+ "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "1f0b254a2a1b236b391c1f8dcaf7a95c9e9f246c",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "92c2b51d15e244d1d223003aadff7582377ac3c5",
+ "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
+ "0f512823e8e0aff1dc30b0a5502209c7f345480a",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html": [
- "b981865251345b348203274fada1441c63a4f96c",
+ "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "44b8145030a8405d45d1b6f8ee2289d6b6b9d997",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "20f21df56570969cae0ca0c31382690cda733f06",
+ "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
+ "dde31a65bfcb1601ad5d90fbffd44c19d9b0ce6a",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "7c597fbcec5ff35babb6219d5a22be50857cbee4",
+ "referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "98d1e9812043b069927a4cce24602ed353f2cd1f",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
- "7ba85fb790c517f3223183557921082709f6c38c",
+ "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html": [
+ "6a5f3c4fcc596b42e5526074503660605fd05b93",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "fe6b2b59b8b58304d4815fc6340b099e9177872c",
+ "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "7784873f7f3f7d5010b5fb863a299d1bbec631c1",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "7cb4aaf09436063880bfaa8c1c44ef5e11310b9e",
+ "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html": [
+ "917c0b88847819501699fbe6ad08a051733f3376",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html": [
- "e7caa27315667953491e6ad620beffcbdcb6eeb8",
+ "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "a00848a63ec75e51160aefc01705414596466ecb",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "b0fc558d76ed8501d84ea42503f9989a8e0ebf09",
+ "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
+ "ebb93af5050bc08a0d6eede2fb8b83f3e9d27977",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html": [
- "bac4c36dfe5aa33de300d637276d9314684d8e54",
+ "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "f4bdee5ce8681848e3add2ec9836f62991c93279",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html": [
- "0d76c92864d6f4530210aaf8096d67184c4671e4",
+ "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
+ "5e12002f256403ce8c705288c4f355b46a1a6965",
"testharness"
],
- "referrer-policy/strict-origin/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html": [
- "2b24a45ec52ba19f4bb4a9d30398edbd251a4241",
+ "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "134f342965ed71e8dbcc1d25ae265561d9302e85",
"testharness"
],
- "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/a-tag/no-redirect/generic.http.html": [
- "00587b4f18a6afa814740c3148d671600e243089",
+ "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/a-tag/no-redirect/generic.http.html": [
+ "d0ab6e1ccbef74310faf625f60d9af70d72bc1fd",
"testharness"
],
- "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html": [
- "3bcc6e82a70198f0c397cf2968feda346dda175d",
+ "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html": [
+ "8f5b1a70b2142dfb6320ae13d44c60b2cac64b2d",
"testharness"
],
- "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html": [
- "387a0b3e6d5d9412f4c00139675f6c6937a7d59b",
+ "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html": [
+ "086c8b1a047cc3ba7e61205a60206e70e993466c",
"testharness"
],
- "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html": [
- "e19734a542ae759c235549e55badf0fb64a8da11",
+ "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html": [
+ "d0e05376f09fbadadda908b63a078e32fbd7e051",
"testharness"
],
- "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html": [
- "72eef24fef5e9131501a0959a1088053fbc6e278",
+ "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html": [
+ "74ed8a8903d259d0d87b1b3b533139f5d319b240",
"testharness"
],
- "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/img-tag/no-redirect/generic.http.html": [
- "c789cf6d302b2e1acdee5cad196950f7f603037d",
+ "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/img-tag/no-redirect/generic.http.html": [
+ "41a4c940c123b583128beb4108ba9b3015831712",
"testharness"
],
- "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html": [
- "a24af8beb2dbb79316b79e07e9184c14e99c3328",
+ "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html": [
+ "37879ce158dc1f54d51f0c55ed0e13e56f0fd2fe",
"testharness"
],
- "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html": [
- "a2773bfb160e4e998c5ea08e28c9824f151df2ad",
+ "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html": [
+ "7bab6eff28eabbc0d69644c50a19187d35833fb4",
"testharness"
],
- "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/script-tag/no-redirect/generic.http.html": [
- "72cedc5e35c5c1a6c0eed922de72b743276b5850",
+ "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/script-tag/no-redirect/generic.http.html": [
+ "b874f1970b1bca5501518450a7bb010564e39037",
"testharness"
],
- "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html": [
- "612d7b36280cdec928734d007dd7d853a52cf5eb",
+ "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html": [
+ "ce4957f92f0627ffbb6671041b6542c0f178d110",
"testharness"
],
- "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/a-tag/no-redirect/generic.http.html": [
- "dca3d06299409aa44d3a8fe98b82875c7702754d",
+ "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/a-tag/no-redirect/generic.http.html": [
+ "08dd0a18a46d224e8b1cec1af6c5457ce4d58d36",
"testharness"
],
- "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html": [
- "2c5328ff25e68f4c362dee910453e7ec7323f010",
+ "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html": [
+ "d940fe023d54829d7ed596fed8cda5494443aa1c",
"testharness"
],
- "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html": [
- "54dab293d80e500094aebe896ffed492dfefa96e",
+ "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html": [
+ "ae67228e393ee75705d7bc4ec3d5d2f1f700b847",
"testharness"
],
- "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html": [
- "9899e2f4e6b7ebb7b9b8d1afc7266ed50384150c",
+ "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html": [
+ "edb49e27f2373a118de1577cbed512295881f4a3",
"testharness"
],
- "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html": [
- "98a55358c7e8056157192bd994daeb8c95917f9b",
+ "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html": [
+ "f48a02175888868fb4c780ccd50b6912e98bf9d0",
"testharness"
],
- "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/img-tag/no-redirect/generic.http.html": [
- "d5843c83a955cb9a14621405ec77fd8620aba947",
+ "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/img-tag/no-redirect/generic.http.html": [
+ "795774b4006be2c6bc9a0b97ae1dbdadde07945e",
"testharness"
],
- "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html": [
- "f7d63a639ef29924cbdbab9f6f173365f2f0ec7b",
+ "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html": [
+ "8d4143e4ab99b882344ef6834c6f19349d7a42c4",
"testharness"
],
- "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html": [
- "bcf8f70bbf774bf7240314da1fdcd8d24c059782",
+ "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html": [
+ "68547fdbb73d4ee73789d666e7972c543a14ad48",
"testharness"
],
- "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/script-tag/no-redirect/generic.http.html": [
- "eca04d52b0274beed7eed501809302e08c2ea166",
+ "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/script-tag/no-redirect/generic.http.html": [
+ "acf4458a1689b5c795a95eba30e6edeee0aff946",
"testharness"
],
- "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html": [
- "91d7ac0ab4d93b9445de7382c8ea0a7958ace19d",
+ "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html": [
+ "6f57c7c4b2b9558f11798154d188bb686f6ef00e",
"testharness"
],
- "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/a-tag/no-redirect/generic.http.html": [
- "72eed78e5a241f9f6548f55812e8335fa723d784",
+ "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/a-tag/no-redirect/generic.http.html": [
+ "e2404361ecd2bbb8706856973981bc90bb249e6e",
"testharness"
],
- "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html": [
- "7a45e12f4f8facecbf19ccc1b9735e04ba5f4ac8",
+ "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html": [
+ "66660f05264a01cfdce44bfd97a038779e88e6a5",
"testharness"
],
- "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/iframe-tag/no-redirect/generic.http.html": [
- "5facb852896e54c8c399d47b72dc7a914e576ea5",
+ "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/iframe-tag/no-redirect/generic.http.html": [
+ "15e978254242857952ad19120cad564ef067c1ba",
"testharness"
],
- "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html": [
- "8ed4f6340056660fd25a65396d69504d4c314601",
+ "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html": [
+ "f5e38ddb803aa273661507ba2a42637341779fcf",
"testharness"
],
- "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html": [
- "70403fe53654d6a931f70fa05cf441e2cc574c8f",
+ "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html": [
+ "20dfb8a3d66188260044fd662a9f3f149f074fa6",
"testharness"
],
- "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/img-tag/no-redirect/generic.http.html": [
- "32dacf7ffdcd6994549e01d73bf5db33a51f72d2",
+ "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/img-tag/no-redirect/generic.http.html": [
+ "661a0cb964cd6b0b14f7a277c870bfffbd7353d8",
"testharness"
],
- "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html": [
- "433f51b14312f8de24d1c81041330a9f3dfb894c",
+ "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html": [
+ "4705a1988873dac499172e22df4f36c344398403",
"testharness"
],
- "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html": [
- "b23ffd4b8e2ca1ccb78229d9f96a20c47b288ce4",
+ "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html": [
+ "66310f711b537dec29306f740c8cb5f5b53da190",
"testharness"
],
- "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/script-tag/no-redirect/generic.http.html": [
- "08f7d0928944cff07ec99f6133f2b2b8bfc058b9",
+ "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/script-tag/no-redirect/generic.http.html": [
+ "79be70d7587779fcfd23529c9251da339455790e",
"testharness"
],
- "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html": [
- "f5bec43c8b225ba84858532dce2336d7c09d6854",
+ "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html": [
+ "d3a7d9627f3b57aa3e07d62e4b943dcf9a17772f",
"testharness"
],
- "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/a-tag/no-redirect/generic.http.html": [
- "c1d52ddb51465285fd9b8d4099f3add98930ad47",
+ "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/a-tag/no-redirect/generic.http.html": [
+ "4140287d37986189912e979a0a75b4e627e2c8b7",
"testharness"
],
- "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html": [
- "5225f28f85073b1733fe5f895dbce696ca2fd4dc",
+ "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html": [
+ "0816608f10f042d610c7c469a5864a7bd499ca57",
"testharness"
],
- "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/iframe-tag/no-redirect/generic.http.html": [
- "e17dbf9ef6a512a37a93a0795686da06b0111ecc",
+ "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/iframe-tag/no-redirect/generic.http.html": [
+ "4af019d39fb30048889d743c6f9653451327524f",
"testharness"
],
- "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html": [
- "613eac440b5089f3375c9b1f542115d75ef34ba6",
+ "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html": [
+ "fde81606e41dcf5948de750eb57272b14a6133cb",
"testharness"
],
- "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html": [
- "dfc5328013a50d133a51e8036cecf782f7460840",
+ "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html": [
+ "930a9c1450c6133a6df2d1eea83cb9a5fa5a4022",
"testharness"
],
- "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/img-tag/no-redirect/generic.http.html": [
- "ea9605e8169f523a8ceb8bcb107aec2a4147888a",
+ "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/img-tag/no-redirect/generic.http.html": [
+ "8d08d63d72816a0814a639fd708966c0a921ebbb",
"testharness"
],
- "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html": [
- "8b5e5cd9c0c39cf22d18ae05170c66e42afdfa43",
+ "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html": [
+ "dbbc89ead389bafce662b3444d7411fc17db4a1a",
"testharness"
],
- "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html": [
- "0913d31a24f697fb415b9f3613689313672cd9e5",
+ "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html": [
+ "a190ee179384a86a74ac1ae3b901010c5a984d30",
"testharness"
],
- "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/script-tag/no-redirect/generic.http.html": [
- "2b06a9ab2a2c2137c8e5dff00176abb96c3f9923",
+ "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/script-tag/no-redirect/generic.http.html": [
+ "3a1d16bec4e29e788a970864066efb681b38ca79",
"testharness"
],
- "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html": [
- "d8375c93426751069de86076316f9d9eba38e89c",
+ "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html": [
+ "572d84007c955b07ee118f90ce179646dd9bf1aa",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/a-tag/no-redirect/generic.http.html": [
- "3353f70740458abee966085e45f14bc359db7e97",
+ "referrer-policy/no-referrer/http-rp/cross-origin/http-http/a-tag/no-redirect/generic.http.html": [
+ "c1a8a0a0bc23076f71a86da443b196a11377cc10",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/a-tag/no-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
+ "referrer-policy/no-referrer/http-rp/cross-origin/http-http/a-tag/no-redirect/generic.http.html.headers": [
+ "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
"support"
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html": [
- "a82cc859c33540e41ca22c8eafc53f65f7aade52",
+ "referrer-policy/no-referrer/http-rp/cross-origin/http-https/a-tag/no-redirect/generic.http.html": [
+ "e1a27e3fbae7587f7bb8c921f86239a65a8cfcc2",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
+ "referrer-policy/no-referrer/http-rp/cross-origin/http-https/a-tag/no-redirect/generic.http.html.headers": [
+ "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
"support"
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/fetch-request/no-redirect/generic.http.html": [
- "8f57b3335ac4e61b746c644cb99d69a8368c22b5",
+ "referrer-policy/no-referrer/http-rp/same-origin/http-http/a-tag/no-redirect/generic.http.html": [
+ "121bfdfa4683ee7197370e56e7680f7b756d8874",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/fetch-request/no-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
+ "referrer-policy/no-referrer/http-rp/same-origin/http-http/a-tag/no-redirect/generic.http.html.headers": [
+ "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
"support"
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html": [
- "3991c32409051280eb6872e6d5b8096684a7950e",
+ "referrer-policy/no-referrer/http-rp/same-origin/http-https/a-tag/no-redirect/generic.http.html": [
+ "3780ae41833ddd01d7bcf3e790d9b2a406601812",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
+ "referrer-policy/no-referrer/http-rp/same-origin/http-https/a-tag/no-redirect/generic.http.html.headers": [
+ "9b531426e5ab952b03e88b378feb5672a1e5eb4e",
"support"
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html": [
- "f61537ab2b70efc119200110aff69a24e2af7908",
+ "referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/a-tag/no-redirect/generic.http.html": [
+ "ba1fd4a411064963389efb295e796a45cfa8b6da",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
- "support"
+ "referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html": [
+ "a09e04cd22c2a723fdf60bc8573bfeecc9e3f4ca",
+ "testharness"
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html": [
- "5dfb2f8a164bfe75de3d238b4d344e2f98276270",
+ "referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/img-tag/no-redirect/generic.http.html": [
+ "9981baec4babe9416ad667f22a95a34e6d8a063f",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
- "support"
+ "referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html": [
+ "c2a92aa157e3240e589abf87de0620682140356d",
+ "testharness"
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html": [
- "50010aaeafa64ed2cd7567aa5532a40762851717",
+ "referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/a-tag/no-redirect/generic.http.html": [
+ "80165257482017b8d00e0ecafc47097d68bf47d3",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
- "support"
+ "referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html": [
+ "33451710956896b1a2d7111680b6c408b4bfba12",
+ "testharness"
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html": [
- "d17712e1d17c1b41aeb9d873519e19bce0625432",
+ "referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/img-tag/no-redirect/generic.http.html": [
+ "c444cb95402a7a5a85386943cf255fc4d5e0c3df",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
- "support"
+ "referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html": [
+ "8d06c867b75f9f578314c5589a0e5726dfb2fe9f",
+ "testharness"
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/no-redirect/generic.http.html": [
- "e514cb738d34b5c4dc79b50c65ea565f65f47bf2",
+ "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/a-tag/no-redirect/generic.http.html": [
+ "96ac4f9de15e784b4d8143c753a3f81d49c361c4",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/no-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
- "support"
+ "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html": [
+ "ec0a21e2db1347f1193675ee6b441351f7b35663",
+ "testharness"
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html": [
- "679128d15f36f122b735acc80c92e22d3d0baa62",
+ "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/img-tag/no-redirect/generic.http.html": [
+ "6255a8d29cfb3c1c9a73b1e3afe03bd9e62a969d",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
- "support"
+ "referrer-policy/no-referrer/meta-referrer/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html": [
+ "b878f3839f2423e6e9461eef3ecfff98c4364dc3",
+ "testharness"
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html": [
- "8afd60eabca0155acea7da94424a8164627599c1",
+ "referrer-policy/no-referrer/meta-referrer/same-origin/http-https/a-tag/no-redirect/generic.http.html": [
+ "01179a3fab96518fdddda0d4b42f336658874950",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
- "support"
+ "referrer-policy/no-referrer/meta-referrer/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html": [
+ "5072cbcf152f74bc9fee63a69c514d1d984987c3",
+ "testharness"
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/script-tag/no-redirect/generic.http.html": [
- "f63430fde9102bbf11cbbef92033281a3fd6c147",
+ "referrer-policy/no-referrer/meta-referrer/same-origin/http-https/img-tag/no-redirect/generic.http.html": [
+ "6941a3a73a35a8380b5d738588f84a7172ac51bd",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/script-tag/no-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
- "support"
+ "referrer-policy/no-referrer/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html": [
+ "cf296add12bf0872948c65bd8042cd1e74869100",
+ "testharness"
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html": [
- "6f78f7ab5819fc1a208719d8861868b1725e41d2",
+ "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/a-tag/no-redirect/cross-origin.http.html": [
+ "630393ca7b7c8d068bc663f5d02a320feb5e1f2b",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
- "support"
+ "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-origin.http.html": [
+ "660496841a4b67db9d6ebab4879128461e3d0b82",
+ "testharness"
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html": [
- "10fca8ad729e90f341442f9614f1cab0f4dfbab9",
+ "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/iframe-tag/no-redirect/cross-origin.http.html": [
+ "3f0455561a7cc68805855a198a064c113d7e34cd",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
- "support"
+ "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-origin.http.html": [
+ "58a3e67dfb7d773ce133f037a987cc1194bc80b8",
+ "testharness"
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/xhr-request/no-redirect/generic.http.html": [
- "f60d3ed06cc7a0676929af913b05eb4c0b2af50b",
+ "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/cross-origin.http.html": [
+ "fe7d67eac06ea36525e7b2d7d28a3253964a1ae2",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/xhr-request/no-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
- "support"
+ "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/no-redirect/cross-origin.http.html": [
+ "94d9aa008c80313c6e71a26715f3c932c931360e",
+ "testharness"
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html": [
- "44b1b21a711425a8f4e41ce71f61f73bce7b55a7",
+ "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/cross-origin.http.html": [
+ "5b7d1de44cc3a09201e37e345f71499302d6179d",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
- "support"
+ "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/cross-origin.http.html": [
+ "8b6ac65947caa0fe6b143aa42884d523f28dacff",
+ "testharness"
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/a-tag/no-redirect/generic.http.html": [
- "8d9b118d13f191029583b60fe6802cd75839ebb1",
+ "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/script-tag/no-redirect/cross-origin.http.html": [
+ "2f6692c42930b568c7862dd5535c0832d0bb2e0a",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/a-tag/no-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
- "support"
+ "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/cross-origin.http.html": [
+ "93e56189dfb6af99d27a33ee75ddf8bdcdfd3a80",
+ "testharness"
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html": [
- "e9349686169f71c8ef58772f6b1737b984906380",
+ "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/a-tag/no-redirect/cross-origin.http.html": [
+ "baf2fe784407fb8e1f32fefc8735b0a90ae77367",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
- "support"
+ "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/cross-origin.http.html": [
+ "0736088aa841d21dc4a27dae62260332ed9b208c",
+ "testharness"
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/fetch-request/no-redirect/generic.http.html": [
- "894676e8544403970deeea77b1166630ed39c299",
+ "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/iframe-tag/no-redirect/cross-origin.http.html": [
+ "e6de3ee6078627f082db8f720bd4ba880215d5ae",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/fetch-request/no-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
- "support"
+ "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/cross-origin.http.html": [
+ "eb27059a957ff35608a8adda4a3c44bf4c6e877b",
+ "testharness"
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html": [
- "42b84b215082796fc31d3c74c9720ed4f4f5dd5a",
+ "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/cross-origin.http.html": [
+ "eb1c0191a3bee7f8397e35181eda73fece70459b",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
- "support"
+ "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/no-redirect/cross-origin.http.html": [
+ "9d006903a0ecb7eb4f64fb4444e84241e5a60525",
+ "testharness"
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html": [
- "9383af1ee7125da47f43386a4687a0185de4db0f",
+ "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/cross-origin.http.html": [
+ "911649a5d14a91e50d73446f93ecd407fca79642",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
- "support"
+ "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/cross-origin.http.html": [
+ "27cb0340e0f7a640871797ad23916bd752c48050",
+ "testharness"
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html": [
- "03c22def281bc77e76be4dfdd426319f90a518b4",
+ "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/script-tag/no-redirect/cross-origin.http.html": [
+ "08c297eae3be1e54e4a4801bdbfb12d5e7475a22",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
- "support"
+ "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/cross-origin.http.html": [
+ "3b72cc842c99c49b59fe0c0abafea1a90205120c",
+ "testharness"
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html": [
- "f14ea6703b3a262de9edd0af6e0a5331b985a5d5",
+ "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/a-tag/no-redirect/same-origin-insecure.http.html": [
+ "89532a53691ecf311dc1d91e4ec95b02f92d9932",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
- "support"
+ "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/same-origin-insecure.http.html": [
+ "959d00137c02d62fe2b295b9b3a24ddabcf94c6b",
+ "testharness"
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html": [
- "de791441ea7112958d98f2a7d1220ab9bc219cae",
+ "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/iframe-tag/no-redirect/same-origin-insecure.http.html": [
+ "7ba2e047912035f0455dda6e854cbf40befb131f",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
- "support"
+ "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html": [
+ "8b215bc8f4ccea682e8f4e426c5561287ee3dd67",
+ "testharness"
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/no-redirect/generic.http.html": [
- "83707cdee070a4b9715538062e3a76ea3f53dac0",
+ "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/same-origin-insecure.http.html": [
+ "4c4ea0c52d51fd6475a72bf8738511f33ba84883",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/no-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
- "support"
+ "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/no-redirect/same-origin-insecure.http.html": [
+ "3ae29a17caa29bc0f0721070b752ceb9948df04c",
+ "testharness"
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html": [
- "2b92b33df18021e647ec87fd728551097e4320fd",
+ "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/same-origin-insecure.http.html": [
+ "e47bca42c765f858671353650023afdf9ce763fc",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
- "support"
+ "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/script-tag/keep-origin-redirect/same-origin-insecure.http.html": [
+ "c6421476aef9df2ee76315bcf69306a3f3e3e65f",
+ "testharness"
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html": [
- "142267bd452512c72bc26ac8fe3200ea53e1a3c4",
+ "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/script-tag/no-redirect/same-origin-insecure.http.html": [
+ "77c266d21e2f8c408b265f0ca819f0bb4ca2e11a",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
- "support"
+ "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/script-tag/swap-origin-redirect/same-origin-insecure.http.html": [
+ "511058ccf50700159c9f8c9dee4c2f5e422aab1d",
+ "testharness"
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/script-tag/no-redirect/generic.http.html": [
- "738f5c34adee16cc22129897ebf2486653a96dd6",
+ "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/a-tag/no-redirect/same-origin-upgrade.http.html": [
+ "ffc0a2ee559cb7d488c14608a436be1a9f7447ff",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/script-tag/no-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
- "support"
+ "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-upgrade.http.html": [
+ "8ede638ebbf1cacb90e222cdd97da87aed440888",
+ "testharness"
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html": [
- "a3be0469c9f0446baa2e86671b6336c0bbf77c3d",
+ "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/no-redirect/same-origin-upgrade.http.html": [
+ "288fa038a4f41cd64567fb356a3cb88aa52f3f35",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
- "support"
+ "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html": [
+ "f8e8509b8c8494df8be4797eedf2277f624c39ae",
+ "testharness"
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html": [
- "29ac25d14a1251e6120e5983da6fbd54a8e95ebd",
+ "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-upgrade.http.html": [
+ "88ab886b2338d25ee790434fc25d8be68e13cbf8",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
- "support"
+ "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/no-redirect/same-origin-upgrade.http.html": [
+ "f2482c3b3aebd55a69780f16a29899df697ec6ff",
+ "testharness"
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/xhr-request/no-redirect/generic.http.html": [
- "3a95f9f42b879e76901f0cace304ec5a66e9c088",
+ "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html": [
+ "24ab142cfd7c61ad1dde43544e04c3ba83d1b614",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/xhr-request/no-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
- "support"
+ "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-upgrade.http.html": [
+ "91d8a23ea5ea8eac7ddbd8e7e17055b761ad6a3d",
+ "testharness"
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html": [
- "177abec135b2f59ad53257466d465167a67fd5a9",
+ "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/no-redirect/same-origin-upgrade.http.html": [
+ "d486a7b8569bf5597aea470d5ec0a88507ad5f4f",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
- "support"
+ "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html": [
+ "bac54212f090b41c7e5c042137d5483eead4eace",
+ "testharness"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/a-tag/no-redirect/generic.http.html": [
- "8dace8330263e75529ad1f94b4752c024a9c1488",
+ "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/a-tag/no-redirect/cross-origin.http.html": [
+ "fe1ec67414d5148d1fdc4578132624ec4e79be3a",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/a-tag/no-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
+ "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/a-tag/no-redirect/cross-origin.http.html.headers": [
+ "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
"support"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html": [
- "5ba49e0acdd46d27221ea7a25a9b11fbf28e8032",
+ "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/a-tag/no-redirect/cross-origin.http.html": [
+ "d36ac614868ed5876dfd83d7d7f1baded7be7593",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
+ "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/a-tag/no-redirect/cross-origin.http.html.headers": [
+ "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
"support"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/fetch-request/no-redirect/generic.http.html": [
- "4bff34e02c947b0b9eeb6069556afac3bcce98c5",
+ "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/a-tag/no-redirect/same-origin-insecure.http.html": [
+ "f4db0be0e50a3e66d7eadb2b1eaeff2fa1072509",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/fetch-request/no-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
+ "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/a-tag/no-redirect/same-origin-insecure.http.html.headers": [
+ "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
"support"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html": [
- "fa58ac157f2a69445a9d99ad22faf45e22a782c8",
+ "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/a-tag/no-redirect/same-origin-upgrade.http.html": [
+ "e9125ad06822298506b35dda16d51f1273c3d03f",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
+ "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/a-tag/no-redirect/same-origin-upgrade.http.html.headers": [
+ "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
"support"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html": [
- "4cf2262dab7ef7873a78e86d211335e5f06862aa",
+ "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/a-tag/no-redirect/cross-origin.http.html": [
+ "7d128a216ef75637832ff7a396834471efc5c417",
+ "testharness"
+ ],
+ "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/cross-origin.http.html": [
+ "f93f8399ef7a63d1bf2bccac4c1c425381ffb94f",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
- "support"
+ "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/no-redirect/cross-origin.http.html": [
+ "ef7dfd49fe4b8a0ed379cc1b8818d482c8d81b1a",
+ "testharness"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/iframe-tag/no-redirect/generic.http.html": [
- "aedf67b946b677d8e7b5fb970ee0fd0a13bbe8bd",
+ "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/cross-origin.http.html": [
+ "6335b58a250d6dd753fdff0d1d726914a2053deb",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/iframe-tag/no-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
- "support"
+ "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/a-tag/no-redirect/cross-origin.http.html": [
+ "bfae1b4ce35cd823606a7f5fc14fc0112a53b8b7",
+ "testharness"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html": [
- "4181c8a875f9551ae91075adb547f6aa710d9869",
+ "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/cross-origin.http.html": [
+ "3d8e32017d195ab4252b2507943a4fa8cc006b09",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
- "support"
+ "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/img-tag/no-redirect/cross-origin.http.html": [
+ "9fa4ca3c127760d4889756e89839e65ae0a66d34",
+ "testharness"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html": [
- "dc6f090b51b946b6a6aca2bfd25b8772391adcef",
+ "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/cross-origin.http.html": [
+ "feec6a71fff2d37100ce6a907cd9ad38cfa5cb12",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
- "support"
+ "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/a-tag/no-redirect/same-origin-insecure.http.html": [
+ "c9d64acd3ff519673914c0a921d1d4c6730d4ab4",
+ "testharness"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/no-redirect/generic.http.html": [
- "22d449d42f4fbbc324612cbdc948475acfd1f0a9",
+ "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/img-tag/keep-origin-redirect/same-origin-insecure.http.html": [
+ "2986e09860fd2ee0b6847efbf483c4ebc2a3b2fb",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/no-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
- "support"
+ "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/img-tag/no-redirect/same-origin-insecure.http.html": [
+ "b44acdd3f3bd62b513b1d41267e2810476ec65db",
+ "testharness"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html": [
- "1492be672bfb13df313e3d87cb50712cb62bf63d",
+ "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/img-tag/swap-origin-redirect/same-origin-insecure.http.html": [
+ "da358ee0e1c90cda547d6e25bf2c4858db18ef29",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
- "support"
+ "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/a-tag/no-redirect/same-origin-upgrade.http.html": [
+ "a709e40c51bed38738d5fe4546688fd20095464d",
+ "testharness"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/generic.http.html": [
- "c35639823ec90d0c9b0b00e96ca86592214b0999",
+ "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-upgrade.http.html": [
+ "140fbb9684b9834702b642c8ccc0f050e68372e6",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
- "support"
+ "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/no-redirect/same-origin-upgrade.http.html": [
+ "be879a223147a9f9824f63665aea3b7614be1516",
+ "testharness"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/module-worker/no-redirect/generic.http.html": [
- "bc5f3bc3e9429d6c07b3bb15585c97184772874d",
+ "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html": [
+ "95973ce73085d514495c4faa60c8612de7e15db7",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/module-worker/no-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
- "support"
+ "referrer-policy/origin/attr-referrer/cross-origin/http-http/a-tag/no-redirect/generic.http.html": [
+ "ef0836b8e8759325d50c23bcc206b5fe974e2593",
+ "testharness"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html": [
- "c458763f10e926c7640b78235c35654fbe382097",
+ "referrer-policy/origin/attr-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html": [
+ "86f6a004c32706f57518b11600e41212876de0c6",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
- "support"
+ "referrer-policy/origin/attr-referrer/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html": [
+ "c404fcf03f9e76a1408f2387b338d9c6335333a7",
+ "testharness"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/script-tag/no-redirect/generic.http.html": [
- "00e1d936324fe7fd05988d17df302d8c1825e895",
+ "referrer-policy/origin/attr-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html": [
+ "f3f701fd230d672c61772c7054201569a1f59173",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/script-tag/no-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
- "support"
+ "referrer-policy/origin/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html": [
+ "2ea65da273ee14f51844c0ff2cd82d814e0d9901",
+ "testharness"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html": [
- "c17379cfad0992c0498ad1653fd6ddea1f17ba2d",
+ "referrer-policy/origin/attr-referrer/cross-origin/http-http/img-tag/no-redirect/generic.http.html": [
+ "90a500cfae7b89c2a8541b58e8ce0804d0ab4718",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
- "support"
+ "referrer-policy/origin/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html": [
+ "79c96e6f2b418a2bd7b07009a0b7d9270b2d8198",
+ "testharness"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/generic.http.html": [
- "faca9b10f8728ddb4add24628b39a1f469539274",
+ "referrer-policy/origin/attr-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html": [
+ "714a08bc7bd4da9ff1812fd31768613d99df042d",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
- "support"
+ "referrer-policy/origin/attr-referrer/cross-origin/http-http/script-tag/no-redirect/generic.http.html": [
+ "ff7e409b8d98db62ff9f3c442509d66f0e7919ac",
+ "testharness"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/shared-worker/no-redirect/generic.http.html": [
- "b0c9e254228d35a30909b1a51df165e6f14e7cd7",
+ "referrer-policy/origin/attr-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html": [
+ "6e914683ee821997b67dee5cc1c0daf52986af15",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/shared-worker/no-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
- "support"
+ "referrer-policy/origin/attr-referrer/cross-origin/http-https/a-tag/no-redirect/generic.http.html": [
+ "1a8ab2b48306295d1b8f3eb87d8dfbc50f0b7358",
+ "testharness"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/generic.http.html": [
- "ec8d76fc0c92adb52c2a19a6683e7a1fc8ff8286",
+ "referrer-policy/origin/attr-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html": [
+ "4f8dadde3c41e15e568b9a6321e57b9cdfbdfe76",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
- "support"
+ "referrer-policy/origin/attr-referrer/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html": [
+ "8f130d28a17578f82edb8543e17aa4b045289b8d",
+ "testharness"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/worker-request/no-redirect/generic.http.html": [
- "3334b1aba363f4640686fc2baa665a32897c432f",
+ "referrer-policy/origin/attr-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html": [
+ "75eadba3d1efa74cdc8c978f997963481e2b59f9",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/worker-request/no-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
- "support"
+ "referrer-policy/origin/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html": [
+ "4fe3af9ffd3bb4b077f3c65e7f1f8817cce4685d",
+ "testharness"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html": [
- "cf19b751ec82501464de5d1736a868584dafdf73",
+ "referrer-policy/origin/attr-referrer/cross-origin/http-https/img-tag/no-redirect/generic.http.html": [
+ "48631e39d2622d7d3e3133314c761790bdc00957",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
- "support"
+ "referrer-policy/origin/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html": [
+ "3b10e291d3361090bb84e60264154aeccbd17e1d",
+ "testharness"
+ ],
+ "referrer-policy/origin/attr-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html": [
+ "bbc4061c2d27c37dc54d6be19a831c6aa86f460e",
+ "testharness"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/xhr-request/no-redirect/generic.http.html": [
- "4c44cbce0d9503a62143997a9b82f521e6073aea",
+ "referrer-policy/origin/attr-referrer/cross-origin/http-https/script-tag/no-redirect/generic.http.html": [
+ "2d2ef35f6812f46c99af481956c3292dc69f12b4",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/xhr-request/no-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
- "support"
+ "referrer-policy/origin/attr-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html": [
+ "47c51d9df663b03012695da3516a02e6ab0695c5",
+ "testharness"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html": [
- "61889e61f9568b2212baaf2a51de85c1dcef74dc",
+ "referrer-policy/origin/attr-referrer/same-origin/http-http/a-tag/no-redirect/generic.http.html": [
+ "330d3f0f907d853eb503531137c7deecf4a05b6f",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
- "support"
+ "referrer-policy/origin/attr-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html": [
+ "ea15eec31891a4328f5cebf1d47df7d42f151a38",
+ "testharness"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/a-tag/no-redirect/generic.http.html": [
- "1a03c3d9dde8b3ce49bc03e41116eff54cba3179",
+ "referrer-policy/origin/attr-referrer/same-origin/http-http/iframe-tag/no-redirect/generic.http.html": [
+ "61323de7a029a42918dffd54dd6590fcdf4d2d8f",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/a-tag/no-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
- "support"
+ "referrer-policy/origin/attr-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html": [
+ "c59ee9d340c69148e2bdb886d4d52abae1f8f99a",
+ "testharness"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html": [
- "35f3e69127d36b94afb1c3c7d2fd2fa5434a3fbf",
+ "referrer-policy/origin/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html": [
+ "51b9ba265647a4b6dabe21e112721d0dce0ce7e6",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
- "support"
+ "referrer-policy/origin/attr-referrer/same-origin/http-http/img-tag/no-redirect/generic.http.html": [
+ "72e74ac6802a9cf6de29353dcde4dea78c65ddee",
+ "testharness"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/fetch-request/no-redirect/generic.http.html": [
- "9cc15eb4b9094c415b4a975b995d2b342fb8191a",
+ "referrer-policy/origin/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html": [
+ "39c651732647ee15c47c8f32c7258442bae8370d",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/fetch-request/no-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
- "support"
+ "referrer-policy/origin/attr-referrer/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html": [
+ "9af146296a2a51b9c76b3267c93a89c22f4bc3b1",
+ "testharness"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html": [
- "dc5ffbd5de6f8736a2b33b6dea0a8ace8a95ecad",
+ "referrer-policy/origin/attr-referrer/same-origin/http-http/script-tag/no-redirect/generic.http.html": [
+ "4000dd3467dbccd3d31826653b47ad01ff54e37a",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
- "support"
+ "referrer-policy/origin/attr-referrer/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html": [
+ "547c19ff4852446c7766e2e7229939ad02ba0284",
+ "testharness"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html": [
- "2ac2803d0ed16688731e75846de880a19e17c381",
+ "referrer-policy/origin/attr-referrer/same-origin/http-https/a-tag/no-redirect/generic.http.html": [
+ "ec64d6fff5a3033dbad357fc7b16a377907a0311",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
- "support"
+ "referrer-policy/origin/attr-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html": [
+ "2623fe82db01c67d5339d87afb0340e9e5b8af89",
+ "testharness"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/iframe-tag/no-redirect/generic.http.html": [
- "5b22bbc5dce1625f0193d885cd883d49008253e6",
+ "referrer-policy/origin/attr-referrer/same-origin/http-https/iframe-tag/no-redirect/generic.http.html": [
+ "adce8bdb5693cf9164c801b358c971adf44ae33e",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/iframe-tag/no-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
- "support"
+ "referrer-policy/origin/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html": [
+ "fbfb700eb942f4f81b60865acc65a95b76d24a15",
+ "testharness"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html": [
- "125d2fb6c3d973700747ac561e9976d130b75776",
+ "referrer-policy/origin/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html": [
+ "68a33b74a18b0d22299f590b925c9485c883b453",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
- "support"
+ "referrer-policy/origin/attr-referrer/same-origin/http-https/img-tag/no-redirect/generic.http.html": [
+ "40e7caed48554bee235dd35989bd1f606dbf33d0",
+ "testharness"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html": [
- "bf9143c2874d43dc97ac480ad1a84d8f1df7177e",
+ "referrer-policy/origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html": [
+ "7992aa6e009b7eae992387bebbdfe9fd04cdbf76",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
- "support"
+ "referrer-policy/origin/attr-referrer/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html": [
+ "9c4011d2817e6fa18ad45b98b4cf60dbe862b48c",
+ "testharness"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/no-redirect/generic.http.html": [
- "bdb66972d4a40bf141c8c144318c427c0f0e384a",
+ "referrer-policy/origin/attr-referrer/same-origin/http-https/script-tag/no-redirect/generic.http.html": [
+ "b174ef4feca3b4ba3edecdef4b5977f9f81e4783",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/no-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
- "support"
+ "referrer-policy/origin/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html": [
+ "6d987fbcb5253f051dc4d3e2999a442fcfcfc56a",
+ "testharness"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html": [
- "8aaeb88417742966b5a6083f9049f1efd2d5631b",
+ "referrer-policy/origin/http-rp/cross-origin/http-http/a-tag/no-redirect/generic.http.html": [
+ "9fa486e6ef1b9cad07b3c8574951a506b77c39a2",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
+ "referrer-policy/origin/http-rp/cross-origin/http-http/a-tag/no-redirect/generic.http.html.headers": [
+ "306a53536ac57625957da5cf4ff55e4124276617",
"support"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html": [
- "ff3cd97f49769e920a7798aa73b42aaa3b6ff12b",
+ "referrer-policy/origin/http-rp/cross-origin/http-https/a-tag/no-redirect/generic.http.html": [
+ "40606039bedef1fe8d51e73c3591c805d9542caa",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
+ "referrer-policy/origin/http-rp/cross-origin/http-https/a-tag/no-redirect/generic.http.html.headers": [
+ "306a53536ac57625957da5cf4ff55e4124276617",
"support"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/script-tag/no-redirect/generic.http.html": [
- "3f38a8a242db2d113c62da3c0777fda1eef0ed5a",
+ "referrer-policy/origin/http-rp/same-origin/http-http/a-tag/no-redirect/generic.http.html": [
+ "669b174a081ddf8a9a343731ed95a3a0304af16e",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/script-tag/no-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
+ "referrer-policy/origin/http-rp/same-origin/http-http/a-tag/no-redirect/generic.http.html.headers": [
+ "306a53536ac57625957da5cf4ff55e4124276617",
"support"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html": [
- "b1d13cdf89decd7791f7b26e009b739949384067",
+ "referrer-policy/origin/http-rp/same-origin/http-https/a-tag/no-redirect/generic.http.html": [
+ "ed249742bfda996c31ee78498720021f586daf60",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
+ "referrer-policy/origin/http-rp/same-origin/http-https/a-tag/no-redirect/generic.http.html.headers": [
+ "306a53536ac57625957da5cf4ff55e4124276617",
"support"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html": [
- "6e02ec75c7de9e4738de83846b59d2d5739f3542",
+ "referrer-policy/origin/meta-referrer/cross-origin/http-http/a-tag/no-redirect/generic.http.html": [
+ "8a7ede0d2ddabaab705f9bc147e884fff273e98b",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
- "support"
+ "referrer-policy/origin/meta-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html": [
+ "1a5ad9592d5fd28fdbfd06bd2067e58b9c6b4fa7",
+ "testharness"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/xhr-request/no-redirect/generic.http.html": [
- "dbba2048bacb0cb0078d9a5bfc2bc3b6db08c3f2",
+ "referrer-policy/origin/meta-referrer/cross-origin/http-http/img-tag/no-redirect/generic.http.html": [
+ "0ada60ada7117218c2211447c60a525bf33f0ca7",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/xhr-request/no-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
- "support"
+ "referrer-policy/origin/meta-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html": [
+ "1737905526006bffb455575ebfe0e8bec7167529",
+ "testharness"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html": [
- "f945a1d0c8351cd04ebf5740c9df3f6f56b150ee",
+ "referrer-policy/origin/meta-referrer/cross-origin/http-https/a-tag/no-redirect/generic.http.html": [
+ "60094d7f0abe1838bf39a4f720b77f0f94888a21",
"testharness"
],
- "referrer-policy/unsafe-url/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html.headers": [
- "c67e521584390fb6c068bcb1a814d73ed9543570",
- "support"
+ "referrer-policy/origin/meta-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html": [
+ "483a43cddb138648c2df46f4eb5ab6586c4b8333",
+ "testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/a-tag/no-redirect/generic.http.html": [
- "1ed2a0198cad438b552305cd54f77223249a2002",
+ "referrer-policy/origin/meta-referrer/cross-origin/http-https/img-tag/no-redirect/generic.http.html": [
+ "f27831c876c8aa33b2d56b6b39e5d7ab12c2fe43",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html": [
- "ba120250e9416c4bf6eac7a63065fd3c90c6a42b",
+ "referrer-policy/origin/meta-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html": [
+ "44042cd5008283236daf1483253fd8576c3c17f3",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/fetch-request/no-redirect/generic.http.html": [
- "4652268659864706fc4e4b18436b1dfd4fd8e22e",
+ "referrer-policy/origin/meta-referrer/same-origin/http-http/a-tag/no-redirect/generic.http.html": [
+ "7599f2ff24317f5f4f29cdf28684db78a1cc1553",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html": [
- "0c7c8484a4e916db57274e66ee21cdb1aa8791d9",
+ "referrer-policy/origin/meta-referrer/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html": [
+ "f2a25196f712cc72458b8df5a22878fe6aab7e88",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html": [
- "d6b47ccbd360ff099a755bbff274957556ee0c79",
+ "referrer-policy/origin/meta-referrer/same-origin/http-http/img-tag/no-redirect/generic.http.html": [
+ "79c61faa4175c79013ec81332d4916f69b9438a0",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html": [
- "96e137e4112fe17cba492d553a8897045ea8a142",
+ "referrer-policy/origin/meta-referrer/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html": [
+ "3c2117ec0223436fd7fb76000f83ffca1999159c",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html": [
- "06ba58084f3f45c209e4c48ad30050e7b0b0add1",
+ "referrer-policy/origin/meta-referrer/same-origin/http-https/a-tag/no-redirect/generic.http.html": [
+ "f3608e17eb9e9b4e00e97af35ecb5a2d27b8a68e",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html": [
- "cc71a6ca6896b0ed81f30adb0d0c1408631915eb",
+ "referrer-policy/origin/meta-referrer/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html": [
+ "bde05c454fdc270c6c58b9b26d61c96dd12f08cb",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/img-tag/no-redirect/generic.http.html": [
- "18fa571fbf2d6b44cf6ff96096a5cc9bc6df8bf5",
+ "referrer-policy/origin/meta-referrer/same-origin/http-https/img-tag/no-redirect/generic.http.html": [
+ "7d723ab86a122870119fc6e46fbe8d6d64a1992d",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html": [
- "bbfd11f31feff89a66282043d560743696219b77",
+ "referrer-policy/origin/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html": [
+ "e04b8253413a606b5913c532ac9c3934188310cf",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html": [
- "d54694fb1eda6aba635677692b7de3bc72098d2a",
+ "referrer-policy/same-origin/attr-referrer/cross-origin/http-http/a-tag/no-redirect/cross-origin.http.html": [
+ "7bcc2189a06b278e172ef18e25f2eb77a9080976",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/script-tag/no-redirect/generic.http.html": [
- "6e1a080f9cb98653c77bf9c8b045b8d4f780d958",
+ "referrer-policy/same-origin/attr-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-origin.http.html": [
+ "052a9df8e718bc7f5b1a536b542afeb9e77d2d1f",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html": [
- "6343373d16a75650431a4e082aa37f3238a2d955",
+ "referrer-policy/same-origin/attr-referrer/cross-origin/http-http/iframe-tag/no-redirect/cross-origin.http.html": [
+ "92b1559f77a34faf3d2e27c3dbc9139bf6ac7594",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html": [
- "5659e1f17fdb9d561e3aea3edb0677f8027e4e10",
+ "referrer-policy/same-origin/attr-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-origin.http.html": [
+ "c047ae9b3d2391726700ede6082f3290ede16268",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/xhr-request/no-redirect/generic.http.html": [
- "bf32a5b6b59311f3ec32f977c614b446c45f3186",
+ "referrer-policy/same-origin/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/cross-origin.http.html": [
+ "a1e4d2d8adcdf6ce31d723674acb59768c59b6b1",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html": [
- "59919b70ecd39a489523c49cf14e01c3bb14385b",
+ "referrer-policy/same-origin/attr-referrer/cross-origin/http-http/img-tag/no-redirect/cross-origin.http.html": [
+ "7a1fd76a93063b164e697d47a35d20c624d748bf",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/a-tag/no-redirect/generic.http.html": [
- "7b81605b86fcc1cd058c34446d2b92f0ff29d09d",
+ "referrer-policy/same-origin/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/cross-origin.http.html": [
+ "9b7cf05f66e8942ea379a7bd1af05708db5ac555",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html": [
- "4a3370369644036e4ce16bd40ed182489f16f922",
+ "referrer-policy/same-origin/attr-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/cross-origin.http.html": [
+ "6c6bf43a24da351d73249c4938cf1022a3f058b6",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/fetch-request/no-redirect/generic.http.html": [
- "d767da3fd7bf8ca76db18353170c9ba96424637b",
+ "referrer-policy/same-origin/attr-referrer/cross-origin/http-http/script-tag/no-redirect/cross-origin.http.html": [
+ "adbecffb5055ad8b9601fb43131ff2ca18c3c41f",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html": [
- "a119bd26f512f6c7ec14b669bce130667095eeb7",
+ "referrer-policy/same-origin/attr-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/cross-origin.http.html": [
+ "a0942713fda3f86974fed9cfb2e0ae32f985b0eb",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html": [
- "9045c6f9877be62623a83f6e880c5ca9f3dee620",
+ "referrer-policy/same-origin/attr-referrer/cross-origin/http-https/a-tag/no-redirect/cross-origin.http.html": [
+ "b37889b65b81ba6c2f236eab1f7a52764111298f",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html": [
- "79164f38d4f3bc6ff4cdfa38aad7825b7b8d8c0c",
+ "referrer-policy/same-origin/attr-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/cross-origin.http.html": [
+ "dad6e7ec9af0b8026a449559e4eb102f030d7afb",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html": [
- "dabf50d51c685fe96a1f0187e667173af77d7922",
+ "referrer-policy/same-origin/attr-referrer/cross-origin/http-https/iframe-tag/no-redirect/cross-origin.http.html": [
+ "0e379e4312314b6ac9033b6077f3d8bbc92a6c04",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html": [
- "6a28a4c5e54771ec5a16a0034f6b2d26eed28592",
+ "referrer-policy/same-origin/attr-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/cross-origin.http.html": [
+ "1f7a8985a9eaf9c63aefbc1a94eb77692dc33af7",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/img-tag/no-redirect/generic.http.html": [
- "5c47aac9269384079e3d6b2f922e9ce25582aa1e",
+ "referrer-policy/same-origin/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/cross-origin.http.html": [
+ "2cbb6fd3489a6fb1610d396d1cd84b6cd39b5e3c",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html": [
- "c5367f0e3cb11180719119d78b45a590e35ba3be",
+ "referrer-policy/same-origin/attr-referrer/cross-origin/http-https/img-tag/no-redirect/cross-origin.http.html": [
+ "289aa3faacd62c4a5b7664224f239a77ea217852",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html": [
- "6df7de3ecdb23e89c8d9eca0a08a244e79117e15",
+ "referrer-policy/same-origin/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/cross-origin.http.html": [
+ "eaa417eca087df663bd992d9fa5681f3c725ecb1",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/script-tag/no-redirect/generic.http.html": [
- "88c6a0f7abacbccda0110f1afb4ca3835d3c772a",
+ "referrer-policy/same-origin/attr-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/cross-origin.http.html": [
+ "2d2c6d6d04bb77176f33a658f02d83931181bc1f",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html": [
- "df434df7ab15e91e3b03dc958492a5d2626cc9a2",
+ "referrer-policy/same-origin/attr-referrer/cross-origin/http-https/script-tag/no-redirect/cross-origin.http.html": [
+ "7e99eba7a8c0de14a5319861eb19e4bf051e5ff0",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html": [
- "2a264a4b107019254fd384995eec852d44ca80ad",
+ "referrer-policy/same-origin/attr-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/cross-origin.http.html": [
+ "a294cba7c53bd8b21f22bcf72265ca21735e652e",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/xhr-request/no-redirect/generic.http.html": [
- "a6775759e6aad03ef1a605d4ac941218a0fb5069",
+ "referrer-policy/same-origin/attr-referrer/same-origin/http-http/a-tag/no-redirect/same-origin-insecure.http.html": [
+ "0f0f3f586c7061c81392fdbfbb0614a9a564c7d9",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html": [
- "91e3cd520549ad076c744a33e3e5a83536cc0e13",
+ "referrer-policy/same-origin/attr-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/same-origin-insecure.http.html": [
+ "29598521aae474ad8e0249e77f8c5ef35e122954",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/a-tag/no-redirect/generic.http.html": [
- "cc66c5cacd183b3be962f7c0b0ee09c57e80f01f",
+ "referrer-policy/same-origin/attr-referrer/same-origin/http-http/iframe-tag/no-redirect/same-origin-insecure.http.html": [
+ "03618c360eb2ea6a16bdd000f81352ac06f4f8df",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html": [
- "cbf5e1c28ff594acf69c7455d85af5c4cf4634ea",
+ "referrer-policy/same-origin/attr-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html": [
+ "1e785d961ab5f83fa3cdaf6bb1d8096599e4c848",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/fetch-request/no-redirect/generic.http.html": [
- "f2035473523352fae942d4465570d3b89700750c",
+ "referrer-policy/same-origin/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/same-origin-insecure.http.html": [
+ "4e046873b80698f0686963ffd19a4a5df3063677",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html": [
- "f1837a8f7bb87e69eb636414d8914ef0c5f6cb03",
+ "referrer-policy/same-origin/attr-referrer/same-origin/http-http/img-tag/no-redirect/same-origin-insecure.http.html": [
+ "c61e82351abae662c02d9f815581ef965395de0b",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html": [
- "3882bfd35d98678e6e2de5a71e1962113bdf2a3e",
+ "referrer-policy/same-origin/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/same-origin-insecure.http.html": [
+ "96fc319aeeb771d19f522f2056cc07424fa0de56",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/iframe-tag/no-redirect/generic.http.html": [
- "698f9f64c05ee59ae9970ad367b8d8164b2e1074",
+ "referrer-policy/same-origin/attr-referrer/same-origin/http-http/script-tag/keep-origin-redirect/same-origin-insecure.http.html": [
+ "1e54e3910e47c0519b5d9300187ca6bfeebe42e2",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html": [
- "5e6177d17285b7347edbb428ff0734d809895ba4",
+ "referrer-policy/same-origin/attr-referrer/same-origin/http-http/script-tag/no-redirect/same-origin-insecure.http.html": [
+ "a67da15008442cdfdddc04b50b85fa45eda5ee2d",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html": [
- "07314409e95ce6c648bb02dff11bca5cc7d9a40a",
+ "referrer-policy/same-origin/attr-referrer/same-origin/http-http/script-tag/swap-origin-redirect/same-origin-insecure.http.html": [
+ "b5c0081ef670b30fab9000c250f5747155867d4a",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/img-tag/no-redirect/generic.http.html": [
- "c6aafb2d30694b446d4c7f9c540f43218a13616a",
+ "referrer-policy/same-origin/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html": [
+ "9aeeff94ea29d6e9e3f4831f2e5ed2dd5b31cb05",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html": [
- "3e27d0de2aaceb936883489d2d79513c78ea227b",
+ "referrer-policy/same-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html": [
+ "0b75d68887554411a66fd7a729fac2a6fbc34b20",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/module-worker/keep-origin-redirect/generic.http.html": [
- "621ac5bb3e5d2f0245411555ea15ae3bb17e214b",
+ "referrer-policy/same-origin/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html": [
+ "2be11cbd75b1c632d25aef91215d435d53a775a6",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/module-worker/no-redirect/generic.http.html": [
- "8711a507ab5f9ea33e82bdd2a43b83d44cba5ea4",
+ "referrer-policy/same-origin/http-rp/cross-origin/http-http/a-tag/no-redirect/cross-origin.http.html": [
+ "5923bd66f218c216f82ec0c8686e4063d6dee687",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html": [
- "81294f80501b5104fd2d4547ac44b6410d862f21",
+ "referrer-policy/same-origin/http-rp/cross-origin/http-http/a-tag/no-redirect/cross-origin.http.html.headers": [
+ "309da8091a927735fec71fbd4af9acb39eb3a964",
+ "support"
+ ],
+ "referrer-policy/same-origin/http-rp/cross-origin/http-https/a-tag/no-redirect/cross-origin.http.html": [
+ "0bb7ff22833d0673710f999f25f1900524bdb938",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/script-tag/no-redirect/generic.http.html": [
- "d0b1553b75a754500052829bd4f02d194366ac35",
+ "referrer-policy/same-origin/http-rp/cross-origin/http-https/a-tag/no-redirect/cross-origin.http.html.headers": [
+ "309da8091a927735fec71fbd4af9acb39eb3a964",
+ "support"
+ ],
+ "referrer-policy/same-origin/http-rp/same-origin/http-http/a-tag/no-redirect/same-origin-insecure.http.html": [
+ "86ad248198ca36421a965986090a3eb47f15a1fd",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html": [
- "1d5ef96999956ef350e4b1f249585e4d8c5a06c4",
+ "referrer-policy/same-origin/http-rp/same-origin/http-http/a-tag/no-redirect/same-origin-insecure.http.html.headers": [
+ "309da8091a927735fec71fbd4af9acb39eb3a964",
+ "support"
+ ],
+ "referrer-policy/same-origin/meta-referrer/cross-origin/http-http/a-tag/no-redirect/cross-origin.http.html": [
+ "ed415758d0660d20a35d45453241c50539c3f95a",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/shared-worker/keep-origin-redirect/generic.http.html": [
- "2e732e6567cd82f143302c061b2bb3126b98c946",
+ "referrer-policy/same-origin/meta-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/cross-origin.http.html": [
+ "b3424b1ea90df159ac4357acdf1912aa7836db10",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/shared-worker/no-redirect/generic.http.html": [
- "2529091d31c47d545e1c2e2901483a686d6bc5b9",
+ "referrer-policy/same-origin/meta-referrer/cross-origin/http-http/img-tag/no-redirect/cross-origin.http.html": [
+ "40c2b7a9ff80538e4597efcfe68206419d4550cf",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/worker-request/keep-origin-redirect/generic.http.html": [
- "ab2c0a35831c6e15ba4abf853dc7898cfa08e656",
+ "referrer-policy/same-origin/meta-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/cross-origin.http.html": [
+ "13b9d94f53e651983f0c98f1368712ac686f8b94",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/worker-request/no-redirect/generic.http.html": [
- "56668b94ca1ebeb3bc681599cae4fa8525f3b6dc",
+ "referrer-policy/same-origin/meta-referrer/cross-origin/http-https/a-tag/no-redirect/cross-origin.http.html": [
+ "b50c0b60db869878263019cd538f40b5c91be652",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html": [
- "f2593530884459a2e371f0bc04b16b8ebb741ad5",
+ "referrer-policy/same-origin/meta-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/cross-origin.http.html": [
+ "2ae690c53d97c27f587fd4c7a2fc3fe959865e97",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/xhr-request/no-redirect/generic.http.html": [
- "b5c7283668c11388c6aa57db48cd885af8deb773",
+ "referrer-policy/same-origin/meta-referrer/cross-origin/http-https/img-tag/no-redirect/cross-origin.http.html": [
+ "b14908a7b2cb7fc4271cbe54566f074053e84ea0",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html": [
- "d4af8f3c3bbb4edff0acf210db39ffeab8e6fdf8",
+ "referrer-policy/same-origin/meta-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/cross-origin.http.html": [
+ "485c8784c699bc4b8c93cb38a818965b1ff0e1e4",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/a-tag/no-redirect/generic.http.html": [
- "82055a7d4a265bdaaf5fd5f3b17da7710cbfee87",
+ "referrer-policy/same-origin/meta-referrer/same-origin/http-http/a-tag/no-redirect/same-origin-insecure.http.html": [
+ "6f2de0eeff1a23b74ddc877eb405ffc125b62220",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html": [
- "f501512aaf3581988b53732c1e8f126f11b5cd19",
+ "referrer-policy/same-origin/meta-referrer/same-origin/http-http/img-tag/keep-origin-redirect/same-origin-insecure.http.html": [
+ "f6a28d48c1c87bada3f91f60d64d46b5874ef751",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/fetch-request/no-redirect/generic.http.html": [
- "d76e3c62c5640d718abb63fcb5352eebb7dcf681",
+ "referrer-policy/same-origin/meta-referrer/same-origin/http-http/img-tag/no-redirect/same-origin-insecure.http.html": [
+ "a38fcd1affaa899d1df49f5fef443ac3679a04af",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html": [
- "7f50fdbe0775eed27bdf12fa6b8894c75de47700",
+ "referrer-policy/same-origin/meta-referrer/same-origin/http-http/img-tag/swap-origin-redirect/same-origin-insecure.http.html": [
+ "9ac2ca34857a77a6729ccb2aae308e72c339deae",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html": [
- "529b4b306589c557ea728d67f01a970ce5107669",
+ "referrer-policy/same-origin/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html": [
+ "f0d6cdbf00c720d54d10495703455a1efccb3e1f",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/generic.http.html": [
- "340e5d55d5c9e819fd8f9b5684effb5b3547e504",
+ "referrer-policy/spec.src.json": [
+ "ab02dcc1b16e0621ef241b375654a3cd41345e31",
+ "support"
+ ],
+ "referrer-policy/spec_json.js": [
+ "1b507dbcf14ed32abdf0953f0e0abdaecd73efe9",
+ "support"
+ ],
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/a-tag/no-redirect/cross-insecure.http.html": [
+ "849efbc4e7f285e38b9d8f6e747f87cd1638121e",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html": [
- "709d209649bc94b217e61e4dc3e5992b7243cb69",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-insecure.http.html": [
+ "d3ee7cb684b1e59ff32a101ad3034c2f9ecd53b7",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html": [
- "a94a77be5677dcec6895b81e2227cd747208b159",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/iframe-tag/no-redirect/cross-insecure.http.html": [
+ "0f8d60ca672f2a9b335486120b6d81a3088efb6a",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/img-tag/no-redirect/generic.http.html": [
- "289d7ee4ee55e8def5deeff5bfd9858a8db504e4",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-insecure.http.html": [
+ "f09d000eb723a6166ee5bf85a3e93f771813b042",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html": [
- "e8314118acbebbf37b1f1727d571b4785471db60",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/cross-insecure.http.html": [
+ "e28acbe94298d32f9d34ff3307993c563ffe25a7",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html": [
- "3b744a333ca9f76333e6a5914fbe95b0061a0414",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/no-redirect/cross-insecure.http.html": [
+ "948bb08791912b5ab811ca34da60a997c4e45cb0",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/script-tag/no-redirect/generic.http.html": [
- "00c704c6e381bd1d2d00e1ea11671e8994d4377a",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/cross-insecure.http.html": [
+ "ebf8d26f51746bfcc3582006b012d96a9216fab1",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html": [
- "e35b0a640e3249b2c337f566e60eed2616bfbb46",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/cross-insecure.http.html": [
+ "990f752a23d090d7393b2a676c23ff7710496efb",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html": [
- "19f9faed6191d5e12b372df7dad1afcb98816e26",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/script-tag/no-redirect/cross-insecure.http.html": [
+ "66f41a0e32574feadfd911114f7d48e12b5a846a",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/xhr-request/no-redirect/generic.http.html": [
- "42b8a17f07936eaa72485271cd909ec6abb214a8",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/cross-insecure.http.html": [
+ "8e23ad41dedb44702abceba00b31d5a720b19767",
"testharness"
],
- "referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html": [
- "50ab0a6eaeb05a96b93a4ec41bad314571231f09",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
+ "3baa66d36b82f19c60c3f85b5f6e2347d43418a4",
"testharness"
],
- "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html": [
- "14a6eeb2bc663cc5e6ca066dab853a1993784919",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "e5c060c86b3b673d7c9e5360bff394013c7a0267",
"testharness"
],
- "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html": [
- "92c65585c5921cc32010bd7de5a0db5b4b72d4fc",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html": [
+ "8b036117d70250ae2f624999afecf0c00fedbb23",
"testharness"
],
- "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html": [
- "ede753c5361dbea97064e2b9fd20b2baf4edc7b0",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "e165003f6eabbdc0de301971e3f04743e5eb876f",
"testharness"
],
- "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html": [
- "b1f6e1dc1dda20c229fd99e22911cc228f2698c2",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "42492e23b77ec9eb33c5114594f5043f7773ae48",
"testharness"
],
- "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html": [
- "b69090ff2b99613114b71423f04d8187d6347399",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
+ "984b0790d4254ea9c18fdb5eed37bd5b436d05a3",
"testharness"
],
- "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html": [
- "a5bda07fa1740f66cd26160858ecfb45e698a581",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "9bcf3910c1ecd04a9df83d300398dd42ab4a632a",
"testharness"
],
- "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html": [
- "c61e9dfe6f14e01d4e69adec9f55f4724786ebe9",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "cd8c557f05dca5eae753516200ab2c18ec2fba61",
"testharness"
],
- "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html": [
- "d7a06eae0dd9ac6757c838d6f6c98a686f0f0f72",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html": [
+ "c38f30635362dd3301e5b37b38b5534c10c125e4",
"testharness"
],
- "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html": [
- "bd9d445ddc72cb7145c601e2d5dee5881592a560",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "b38e3d4668b89e961ff4b4d6faef3fe568de4c3b",
"testharness"
],
- "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html": [
- "4bcfe741384c86db11e80ab3081033c18e5cff22",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/a-tag/no-redirect/same-insecure.http.html": [
+ "a90739dc4990357d878770724092e77241d485f1",
"testharness"
],
- "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
- "2f55f3f4bf31fdd628479d44084bb46f26304baa",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/same-insecure.http.html": [
+ "83b3601256f6598d4ecd45da954406b7c8363757",
"testharness"
],
- "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "fcdb3014ef792bd277ed0b15c17a8cf05fef7895",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/iframe-tag/no-redirect/same-insecure.http.html": [
+ "72dcd1d2738be6819a7633f3f46b05f6da2d91f9",
"testharness"
],
- "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html": [
- "f6fc0deec71d03747036bb4c23c4d6af84a05ec6",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/same-insecure.http.html": [
+ "b56aa7a2c44f5a81ed4f0070c931e7141f620b35",
"testharness"
],
- "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "90db32e38180823349e0f830481cd7557b275d12",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/same-insecure.http.html": [
+ "bc6c1bfd1eac88b62d7692257087acf1bdc4ba05",
"testharness"
],
- "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "2260553355211278f8943660ad00445509745a9f",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/no-redirect/same-insecure.http.html": [
+ "6087f4b7db9ee86274233ed54c17d812932eedbc",
"testharness"
],
- "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
- "83d37336587bca8a65b994d2ae0899374eda8fee",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/same-insecure.http.html": [
+ "7d2599a1b7137d8dfd030cd49cf93781c1aa8180",
"testharness"
],
- "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "269dd5ab8153cc69c6ee2535ec1722251832c217",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/script-tag/keep-origin-redirect/same-insecure.http.html": [
+ "6581ee64e4ab670f5eeab7cf70e294872f823985",
"testharness"
],
- "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "5367d9e882e1ae5e0e5703dfe296b453f1380595",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/script-tag/no-redirect/same-insecure.http.html": [
+ "9403ed73bcdac48aef3a973274e980bcbf73f56e",
"testharness"
],
- "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html": [
- "999d68c277f371f59c5c55315e0517f2f2b3c73b",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/script-tag/swap-origin-redirect/same-insecure.http.html": [
+ "5345da2d6d45f40c793760d90aa5d1c4cda84b37",
"testharness"
],
- "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "6e57d20ba552f37ab9635b73a3a7368b194e70f4",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
+ "7230246dd234ddd552116923751f8838413cbf8a",
"testharness"
],
- "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html": [
- "b5e3d6c80a3fd065dc3e330149de035df8180f62",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "382334bba5cccf71d99e6abbbec51ed8e874270a",
"testharness"
],
- "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html": [
- "35dc6568c3ae5ede5a142ab984c3d901499b3019",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html": [
+ "8481ed5ab38f218ab79abce299333551263eb6b6",
"testharness"
],
- "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html": [
- "cc38b182da7b83423d3715ec17eac8a5ebf2463f",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "db04cf7f5cc7620372daa6d0a9c86a6d1dcdcbff",
"testharness"
],
- "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html": [
- "dc3f4cf1e5ee3ac92cb63cf127eccc1f00a930bd",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "d35d0c25cc029fab16c1e15b958c9ce0a1ef9756",
"testharness"
],
- "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html": [
- "e5c1855fde432cdad8c9aaff2310c7e2574135ca",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
+ "1a6e2a4aeb304f4ca897598060bdbb87bb270a95",
"testharness"
],
- "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html": [
- "4724f670f985c36d6d835da845b71c3b173dbda8",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "117a3dcd2e95c932ef2bf0084374b69472d626a2",
"testharness"
],
- "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html": [
- "74f9f0e8a748ee208706f004bfdc9ee9e58389db",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "bfd21f6f15f12bfe1123e2d44c699b9611097641",
"testharness"
],
- "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html": [
- "15a6abbf5ca8d2dabdc21f2fb6b81a5ba95cfa14",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html": [
+ "2e6a113369b5bbcb6de531d36ba95f4fcfa66ba3",
"testharness"
],
- "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html": [
- "d8f487a90ef9c4b264a1ec2763ceee919b4bf300",
+ "referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "b9d2ab53f9a22f4b2add660ca90793c81ef47c86",
"testharness"
],
- "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html": [
- "14d4f5fb06baea3fea81da75b8801fdcdb9c2ea5",
+ "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/a-tag/no-redirect/cross-insecure.http.html": [
+ "4dd11a19be9285e60bc044dd955e808ea8871918",
"testharness"
],
- "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
- "3e02f034fec45c922c1ec6db8559c32bf6f82664",
+ "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/a-tag/no-redirect/cross-insecure.http.html.headers": [
+ "d74467b0af6f7dda8bee9107a37e9c14661a9054",
+ "support"
+ ],
+ "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
+ "22f1f3bdc72507d8c64e0af65d94e4f4df3813b7",
"testharness"
],
- "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "3f20abbb40e9a4ed4c5d5d4ff651b79af58eed00",
+ "referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html.headers": [
+ "d74467b0af6f7dda8bee9107a37e9c14661a9054",
+ "support"
+ ],
+ "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/a-tag/no-redirect/same-insecure.http.html": [
+ "26ba53745768bde86374b247c4543ee89ae0bc59",
"testharness"
],
- "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html": [
- "e594604429ff8e2c6ca4ce303a7e54190e94e413",
+ "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/a-tag/no-redirect/same-insecure.http.html.headers": [
+ "d74467b0af6f7dda8bee9107a37e9c14661a9054",
+ "support"
+ ],
+ "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
+ "2fe55648eebf16c4d566eb6514f5380a060119bd",
"testharness"
],
- "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "3e0dcd40d3d229e1d6342a766d679510ff60348c",
+ "referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html.headers": [
+ "d74467b0af6f7dda8bee9107a37e9c14661a9054",
+ "support"
+ ],
+ "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/a-tag/no-redirect/cross-insecure.http.html": [
+ "e2c794e2e2703178b33309c15df52fc5a92933fa",
"testharness"
],
- "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "ef5a7e6c88b1f9e67912005b6c2e0c40eac87611",
+ "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/cross-insecure.http.html": [
+ "6f0993c801077a16480913be20c0375af1eb9eb8",
"testharness"
],
- "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
- "a50da9cb0cc45d547e7ff8d38e0e0a3c3ccd5f11",
+ "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/no-redirect/cross-insecure.http.html": [
+ "9e03d5384e9b34246df8ee78306ff83c71cdc38e",
"testharness"
],
- "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "4a01a41549b2fc56b75ec9ed283225002b1c71a9",
+ "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/cross-insecure.http.html": [
+ "1a928cfec18993f7e92e5d9d500fa595e9ca4248",
"testharness"
],
- "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "0a66eea4641c6d551aa1dae3103bca4985144e3e",
+ "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
+ "12a1bc66e0f32ca381103438654b2bece3152b14",
"testharness"
],
- "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html": [
- "5984794f2a08711464d4f36f6709e27420f2ed29",
+ "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "3e11ade1bcf49632358cb1369706410b127b0326",
"testharness"
],
- "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "0c02a2ead89a211af5b681f59e23af7665e532df",
+ "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
+ "27c4c842c947d851d30f484899de7817cc3b9b30",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html": [
- "f22c4142335834d6dd4cf8f59d7604491a8615cd",
+ "referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "f28e884825ec8151381ea7096a08ee0b9970d1c0",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html": [
- "c656d41de40ada58d1d745686f409abfba75409a",
+ "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/a-tag/no-redirect/same-insecure.http.html": [
+ "62b85068c20f75deb45c338bbb0fecfdef214f38",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html": [
- "874e3cb3bed3b6e14a5bd1488ac538508b2b34c8",
+ "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/img-tag/keep-origin-redirect/same-insecure.http.html": [
+ "9acebe2f0b09702c5f00103067bc748e9f4b5744",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html": [
- "9d54a27187284372bb7e8e5b433fb904b073a47c",
+ "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/img-tag/no-redirect/same-insecure.http.html": [
+ "d1f8677bc8b25eaf2f27b83d91ccad1bd1bb9b41",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html": [
- "43015a873cfb738b1f01607a2c5a393630f2fd6a",
+ "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/img-tag/swap-origin-redirect/same-insecure.http.html": [
+ "a205d415fa384d246f497656e6bce1cfa161368e",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html": [
- "ed58d7bd11b59dfc966b6f2549e140dee9cf8d12",
+ "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
+ "d8ba3dd25db345606c23cada85894fb6a4438456",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html": [
- "c5114ecd89c8913e74373dd675213f0e80cf2b18",
+ "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "4b94af4929c8b30586ba2b477233e7e493103b4b",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html": [
- "34f650da7f40c04006e1447bc10ce48c5cc4d31d",
+ "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
+ "95d6345f7c4034ce5f7d8c0c3302f921a72357bb",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html": [
- "1e668ae6d8b794e75c4e8a456a4d73997a5fa7d4",
+ "referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "17f127f60366df1597b5187241a7e7437172152e",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html": [
- "19d80342987ac6a3cc378d6277bcd672302e7444",
+ "referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html": [
+ "2fb347ef35b8ecc2206f272db95156cdb9a0e771",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html": [
- "705411d518c88efcb1519e3941e1e0e793de3bc5",
+ "referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "0c34da119fcb3634866a7fe153256c3c92fcfa3f",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html": [
- "99c1bc56a43ac09cfabf5a3fbe63421f618725a7",
+ "referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html": [
+ "f992e3939256b8eb977231539bed90323c4b3ccd",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html": [
- "607b4c29e802ce96fe3061adffb4627b63dcd0f8",
+ "referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "e1e6c13ea358c7f8f0178a37a30505271bb2b446",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html": [
- "1bc364522cd27a8ba3607a8596f1ac105522bb72",
+ "referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "fc07b47fd6408b74c6767dbfc385adf699844614",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html": [
- "ca8adad124354fdbeabb9ace93a7b2f931721dcc",
+ "referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html": [
+ "083891dc3c131fb56f8d5372ca206b597c6cae71",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html": [
- "b04ed3354dd51f29d0d7349a987c1ec895983423",
+ "referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "07601e37eb0bc39eb87bc3c8901d27bf6792f61f",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
- "5f1e54d48dbef0d778a29e09c6ffa3572b958347",
+ "referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "811265f11cecd9ca5e83c8ac4c51bd1f29c14d1a",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html": [
- "a06130ce4a4b2859de2aee5dec0e3a6144d207cc",
+ "referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html": [
+ "254a29152f87e95359fffd4749b2c625d379c3d3",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html": [
- "fbdaf4b05572a2d080d8d08172ee5787a021cb7a",
+ "referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "f78fb878fffa6e52bd41177b219b019cb03bd482",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html": [
- "4fd95a894c469a3b0a0d6d4f66423b91638bc2d3",
+ "referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
+ "9c5035945c9081f4527343ba6df6372050def682",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "1f65303cd1026515064cf3bc664c952a94633b04",
+ "referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "4b238c0449d93ae792be3d56fd2d3640b28ef8d2",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html": [
- "4b70a9afd131fb706467ca5c05811b4046777dbc",
+ "referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html": [
+ "a860c257fd7cf4566bc988827416c09dfde21392",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "f3c586e12e2817550478835a1bb0d009bebec9e6",
+ "referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "a798c85d6f54988404b28b9afb0017dac6e8bcc3",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "9bcb05db1fee6710a3edd93004e2d023e7631a76",
+ "referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "3955b78f7ac922c6e05c118dd0c1c99aa675c56f",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
- "7b48d72c92e204c76ca5467a094727931e92944b",
+ "referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
+ "f755d35c825441c134ad8b567f9283c1037a970b",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "5b539644181e96178bef8a84196f2328f5fb686b",
+ "referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "240a3c7f186c06a8271ed65e4bb9a868cf24f92b",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "841b54b58439330a7bf41dff8312e0908a73697e",
+ "referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "8d18e84cb76041841df3ca418d8c63f023c38424",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html": [
- "ae3939410a8a67fe0e32fa8a5644025a4cbc34f5",
+ "referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html": [
+ "38edd1b85df4ba87ddac07869eac39e9123d9a99",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "4e7d7c9b9882a2bf98da9987aa19a1e4e54af3b8",
+ "referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "95f4a17a2a762a1dbdd65b5a6c85899923269d6c",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html": [
- "f48a201bbb015ec6866dd2f378d8a4ba0c9d1fcf",
+ "referrer-policy/strict-origin/attr-referrer/same-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html": [
+ "f80ba3759587e78087833d49cc28922a3020b9f6",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html": [
- "111fa37e95e55269594a257665ff1b9e0e48f125",
+ "referrer-policy/strict-origin/attr-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "ed1b8c033be379b88933ea8c070194a9d0464ade",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html": [
- "d1cc1faef430e0f16b5d9321bbf11dbb3046a4e7",
+ "referrer-policy/strict-origin/attr-referrer/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html": [
+ "050eb6a3904a4dbfcbaa5bff5c4b7a04c5cee3f7",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html": [
- "155e9fb7bf2f9c867dfa38e43a09ae522a174ac1",
+ "referrer-policy/strict-origin/attr-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "143f3f7c87a289c9dc0c673dacbbc537b43f3a36",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html": [
- "bcd5661d9c05c94f8fc52d846ceb7417130944bf",
+ "referrer-policy/strict-origin/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "ffc8190298064e81a4c3bc0ef0c3627cc83375a8",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html": [
- "a637f732ea0bade62b89cc2853da442e09a9dbe6",
+ "referrer-policy/strict-origin/attr-referrer/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html": [
+ "5d8be2bd928046bc40f74a14484e1bbd2f608ae8",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html": [
- "18e29ee1fc6b22858c699faf7ff7dbd7f5027647",
+ "referrer-policy/strict-origin/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "7ceb389b35b5e21b63fedd186ca8583d5c7c66ff",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html": [
- "14ce35bd1eb9271ff7531687b70d39a8b6e8319c",
+ "referrer-policy/strict-origin/attr-referrer/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "f3f5573b7582ec9cce17345415f2df932a829451",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html": [
- "e9b5f75f9cc1432933517a368de96a20f2e733be",
+ "referrer-policy/strict-origin/attr-referrer/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html": [
+ "55edfc9376002b493f8a271fc7a5d62c27748802",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html": [
- "392c57835588afd9e228780edb05782f8814b5e8",
+ "referrer-policy/strict-origin/attr-referrer/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "902fa3341a1812c19d8091055333bee7993745a3",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html": [
- "58977c3e7b471d6fe5596ff17cba06b632a4ddcb",
+ "referrer-policy/strict-origin/attr-referrer/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
+ "bd278695088c2cfdd5d028903cfe94f216d8114b",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html": [
- "59cc2bda48578822bae191cebdbf0a9b085b9d77",
+ "referrer-policy/strict-origin/attr-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "331f865afb25e0066d4fa4861126931693eb0404",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html": [
- "67625838e8d1dc8721a06ce66d5db7ad464072eb",
+ "referrer-policy/strict-origin/attr-referrer/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html": [
+ "b26af2a076cdfdab3c761264efdb65452f32b7c1",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/insecure-protocol.http.html": [
- "45d7f1e916999bd0d3ab5e7466ed687374f960c2",
+ "referrer-policy/strict-origin/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "0d7bdf20697948d118f95f71f69bae85e02151f6",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/module-worker/no-redirect/insecure-protocol.http.html": [
- "7d495b43c578c3e22f5c4debda976fc8c3a870bc",
+ "referrer-policy/strict-origin/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "1360edbceff54f3bfa446af531db26a377ca007c",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html": [
- "afd29bcd69b335b4522fe9b5a366cb621ba7c753",
+ "referrer-policy/strict-origin/attr-referrer/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
+ "2f99fa632176959bf717ef2a4eb6e3851c99d264",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html": [
- "e12c41d3b65ddb093d7a6d7e1ae17c9714eeb356",
+ "referrer-policy/strict-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "f69c1341e0992a2fc3f1306c5cc3c795395e550f",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html": [
- "e44998937144817a9bbaea2fc7b0e41b51363fbb",
+ "referrer-policy/strict-origin/attr-referrer/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "e7ea376cd142a551f3178e35389c9f28e83224a4",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/insecure-protocol.http.html": [
- "7544a66b826163be0a8f355078d476141403bf34",
+ "referrer-policy/strict-origin/attr-referrer/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html": [
+ "859c7267ad547066506e11518ddfac7ebcf16b1e",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/shared-worker/no-redirect/insecure-protocol.http.html": [
- "6c1bf13374562ced88c53e19265857bb0c3d1db6",
+ "referrer-policy/strict-origin/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "747c8e1059db4aeadb3d99fa855619e522d8b225",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/insecure-protocol.http.html": [
- "e6424cdf9335297fba275058f3087cebefd2e23b",
+ "referrer-policy/strict-origin/http-rp/cross-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html": [
+ "9aa77a78c63ae46e9fc13923c66f3d77c1b8e7c3",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/worker-request/no-redirect/insecure-protocol.http.html": [
- "284af1c6860bdbcbb2901f7cf06f2cf72ca509d4",
+ "referrer-policy/strict-origin/http-rp/cross-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html.headers": [
+ "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
+ "support"
+ ],
+ "referrer-policy/strict-origin/http-rp/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
+ "3877d5bce4f2c550ab74d46be30b7636231aeaec",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html": [
- "8c7f2bd5d37afd713f54150537142d0074a2d2bb",
+ "referrer-policy/strict-origin/http-rp/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html.headers": [
+ "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
+ "support"
+ ],
+ "referrer-policy/strict-origin/http-rp/same-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html": [
+ "3449a347dca51f652a994af3db05e877f705f2ac",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html": [
- "5ba5152bc2b200b1beac67fc3a520ed32dd7bf25",
+ "referrer-policy/strict-origin/http-rp/same-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html.headers": [
+ "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
+ "support"
+ ],
+ "referrer-policy/strict-origin/http-rp/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
+ "fb86bc5c45fa86aea0caa61611cc63dadabfea7d",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html": [
- "fcf8844e9008d86427f8430bd0459d2a08f5977a",
+ "referrer-policy/strict-origin/http-rp/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html.headers": [
+ "07af8e286fd7431890f78f10b9e8a0f4b106b5cc",
+ "support"
+ ],
+ "referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html": [
+ "597f4092c2f3160e82176f549fb8507c13b7eb17",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
- "698f15f58c1dcdfab9ad090bfd8bfdd79de6c429",
+ "referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "0fc489100e8d6d74055f7e91e7eca68ffc8318bf",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html": [
- "26b14d7314914d3cb3739a37a52634b27aacbc4e",
+ "referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html": [
+ "0028b48d0b7e97f404b3c532864d01671d709286",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html": [
- "c632fa8e7834c972ec775bba86a8b1bf85e0358d",
+ "referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "8b2dea1cb62f4d5fd0dfdbe22617e9a9997a4046",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html": [
- "4590df6a0158343be205f2d65eede19f8c84c4a7",
+ "referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
+ "c43e52e9dfb1b4301b6d275836c44aa5af0dbb8e",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "cbe8df3c4101810d9e053a2abf9b9684fab20093",
+ "referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "41025c58578ab4aad59c0173077e560d0269f193",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html": [
- "69e5b6b483c76f8d9be9a7529d06adfe3c2cc560",
+ "referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
+ "ada714dcc5088fd580daf2b5cc12e5a71233d7a7",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "177bdd6c7722cf73b438584ee2421c6b9c547745",
+ "referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "a574b1304117a6caeea002855820764dbbca9d45",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "abe6ef4500c3319081f87d5e31dce50d5082f7da",
+ "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html": [
+ "335ff468d905ee397358dc7caab8dff492ce164f",
+ "testharness"
+ ],
+ "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "3675e2391e4e72c154db32767af24039b396b70d",
+ "testharness"
+ ],
+ "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html": [
+ "a94bdfa5d530d9916519262cb89aef7a1e82626a",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
- "15fb33654e5d473876dbbf7a96b309154acf386f",
+ "referrer-policy/strict-origin/meta-referrer/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "623f6a6e81aa33df2fb6d12a7df7bcb353c91c99",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "0d52c78f4a97f1371c52f1e226e7c35b909c2c06",
+ "referrer-policy/strict-origin/meta-referrer/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
+ "0e40587a04020bb8526448e5649b5ff179b612c2",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "ef9db2cbca18dd70e3712419f4ed4ef1e8797eb8",
+ "referrer-policy/strict-origin/meta-referrer/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "7c597fbcec5ff35babb6219d5a22be50857cbee4",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html": [
- "02678004f519f4d011144c2a855aa4ccc27469f6",
+ "referrer-policy/strict-origin/meta-referrer/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
+ "7ba85fb790c517f3223183557921082709f6c38c",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "c391b257a816154a2d68ded1afced901668aa8a5",
+ "referrer-policy/strict-origin/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "fe6b2b59b8b58304d4815fc6340b099e9177872c",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html": [
- "03c4677086d5df06155054fb110be80462dd200c",
+ "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/a-tag/no-redirect/generic.http.html": [
+ "00587b4f18a6afa814740c3148d671600e243089",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html": [
- "60a0f6ebcb33854d6e34731ad931faa772a22733",
+ "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html": [
+ "3bcc6e82a70198f0c397cf2968feda346dda175d",
"testharness"
],
- "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html": [
- "d1745b41235b86cfe0d817f3080dd533765668b2",
+ "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html": [
+ "387a0b3e6d5d9412f4c00139675f6c6937a7d59b",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html": [
- "989c847a5b903f6611db7a66418f7071a9cb8508",
+ "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html": [
+ "e19734a542ae759c235549e55badf0fb64a8da11",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html": [
- "33df9910306ef3a6d44f0c11fb7d514ac83d09de",
+ "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html": [
+ "72eef24fef5e9131501a0959a1088053fbc6e278",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html": [
- "d11c4a1897bc444eff605e93975be7a620c4757b",
+ "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/img-tag/no-redirect/generic.http.html": [
+ "c789cf6d302b2e1acdee5cad196950f7f603037d",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html": [
- "2bf06bb2110bf5cdd8f6bc71f075922f5f824e2e",
+ "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html": [
+ "a24af8beb2dbb79316b79e07e9184c14e99c3328",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html": [
- "2bcca81084ca5e00c11d5f9d062c66cbf81a2c83",
+ "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html": [
+ "a2773bfb160e4e998c5ea08e28c9824f151df2ad",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html": [
- "e4b835d864414aa6618d34c3a150ac49df70e72d",
+ "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/script-tag/no-redirect/generic.http.html": [
+ "72cedc5e35c5c1a6c0eed922de72b743276b5850",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html": [
- "20590be9e244841b5f48d9cd8d8ee79b1eff53b0",
+ "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html": [
+ "612d7b36280cdec928734d007dd7d853a52cf5eb",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html": [
- "cf7b83ef20a7d41c5fc8d5617d4519da8af9145d",
+ "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/a-tag/no-redirect/generic.http.html": [
+ "dca3d06299409aa44d3a8fe98b82875c7702754d",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html": [
- "96f5f8c07a1d0b4172c9ee7e30d8254c4b108591",
+ "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html": [
+ "2c5328ff25e68f4c362dee910453e7ec7323f010",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html": [
- "8573cd5e8ee1547212c0afd5ca29eda46c27245f",
+ "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html": [
+ "54dab293d80e500094aebe896ffed492dfefa96e",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html": [
- "8bf8bd05ff1f300d84760c52afc6d8643f6bf0d6",
+ "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html": [
+ "9899e2f4e6b7ebb7b9b8d1afc7266ed50384150c",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html": [
- "8d330b11bca89e7e15548886bf9012f944d2d26d",
+ "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html": [
+ "98a55358c7e8056157192bd994daeb8c95917f9b",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html": [
- "fe3e977d0000e350fb5a8dec95ceea7daa2afbab",
+ "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/img-tag/no-redirect/generic.http.html": [
+ "d5843c83a955cb9a14621405ec77fd8620aba947",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html": [
- "4db7894a80f04d6cf7ea9a7b942b32eba349cd88",
+ "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html": [
+ "f7d63a639ef29924cbdbab9f6f173365f2f0ec7b",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html": [
- "8bb522349b0b6c1645ee6c167345eb46d812db1b",
+ "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html": [
+ "bcf8f70bbf774bf7240314da1fdcd8d24c059782",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html": [
- "db792b5164a2087cf1a5b5c14d02cdc99fb84bdd",
+ "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/script-tag/no-redirect/generic.http.html": [
+ "eca04d52b0274beed7eed501809302e08c2ea166",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
- "c9b99a6b84184e1edfc8590311770c5d9466e921",
+ "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html": [
+ "91d7ac0ab4d93b9445de7382c8ea0a7958ace19d",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html": [
- "8cdf6d70efabb8048225ab0fde804eabb0714d3a",
+ "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/a-tag/no-redirect/generic.http.html": [
+ "72eed78e5a241f9f6548f55812e8335fa723d784",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html": [
- "9a41ab1b006a1c91000edde42d9f7c000d3c4c26",
+ "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html": [
+ "7a45e12f4f8facecbf19ccc1b9735e04ba5f4ac8",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html": [
- "581efdb75d7baf1d878045ea8a8876b3f4b8c0c6",
+ "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/iframe-tag/no-redirect/generic.http.html": [
+ "5facb852896e54c8c399d47b72dc7a914e576ea5",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "f2c77dcd96c1e06f10ecba4ca24f5d3232e3368a",
+ "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html": [
+ "8ed4f6340056660fd25a65396d69504d4c314601",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html": [
- "8db2725b16bad4bd349abdaba4e2baadb867b818",
+ "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html": [
+ "70403fe53654d6a931f70fa05cf441e2cc574c8f",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "11baca87b2482422f0cf6b5a004645a7e9afae61",
+ "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/img-tag/no-redirect/generic.http.html": [
+ "32dacf7ffdcd6994549e01d73bf5db33a51f72d2",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "0dcfaf498709fcbc66514794d237e8af41ece7cf",
+ "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html": [
+ "433f51b14312f8de24d1c81041330a9f3dfb894c",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
- "7f14e55c1314658193e256b21651129be80de31f",
+ "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html": [
+ "b23ffd4b8e2ca1ccb78229d9f96a20c47b288ce4",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "1c44e334cfd1b9a7f8da224e5aaf53175264f040",
+ "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/script-tag/no-redirect/generic.http.html": [
+ "08f7d0928944cff07ec99f6133f2b2b8bfc058b9",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "e349d5686ffb375d92aca01df466119fc55a53fa",
+ "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html": [
+ "f5bec43c8b225ba84858532dce2336d7c09d6854",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html": [
- "500d47a1c954e4560255b3a4047df271dae4ba2a",
+ "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/a-tag/no-redirect/generic.http.html": [
+ "c1d52ddb51465285fd9b8d4099f3add98930ad47",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "21549ca927e0d9b3693a85e4462aa4f3878385ba",
+ "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html": [
+ "5225f28f85073b1733fe5f895dbce696ca2fd4dc",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html": [
- "ca7d40ed2f6480b86302ae6059787c789afc4a93",
+ "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/iframe-tag/no-redirect/generic.http.html": [
+ "e17dbf9ef6a512a37a93a0795686da06b0111ecc",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html": [
- "fdc8bbef59d399c298a8b2b686fa6b874390eea8",
+ "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html": [
+ "613eac440b5089f3375c9b1f542115d75ef34ba6",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html": [
- "e6518c9e47974797527f917b53cd8237ba90a9b1",
+ "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html": [
+ "dfc5328013a50d133a51e8036cecf782f7460840",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html": [
- "31ef25738901928642d370e856fb99428b10b15c",
+ "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/img-tag/no-redirect/generic.http.html": [
+ "ea9605e8169f523a8ceb8bcb107aec2a4147888a",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html": [
- "220b5aa320dd3fb84c53fb2dc2b23d0504fe3cb6",
+ "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html": [
+ "8b5e5cd9c0c39cf22d18ae05170c66e42afdfa43",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html": [
- "f0b4658aec639d7a751685263ceed718d9113642",
+ "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html": [
+ "0913d31a24f697fb415b9f3613689313672cd9e5",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html": [
- "4cfd819a47321b343bb0f5211cae6b99f900c996",
+ "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/script-tag/no-redirect/generic.http.html": [
+ "2b06a9ab2a2c2137c8e5dff00176abb96c3f9923",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html": [
- "4ea3fe52684ff1bf2bf515d26a89cda3b4ab45e0",
+ "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html": [
+ "d8375c93426751069de86076316f9d9eba38e89c",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html": [
- "0978fb710d6d925d418ff739a4b65d65707137a2",
+ "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/a-tag/no-redirect/generic.http.html": [
+ "3353f70740458abee966085e45f14bc359db7e97",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html": [
- "7a4fe02b9b7d32190d5cc449981802716e258b6d",
+ "referrer-policy/unsafe-url/http-rp/cross-origin/http-http/a-tag/no-redirect/generic.http.html.headers": [
+ "c67e521584390fb6c068bcb1a814d73ed9543570",
+ "support"
+ ],
+ "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/a-tag/no-redirect/generic.http.html": [
+ "8d9b118d13f191029583b60fe6802cd75839ebb1",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html": [
- "bf7140a15d274fb1c7861a74e3089707dbcde37d",
+ "referrer-policy/unsafe-url/http-rp/cross-origin/http-https/a-tag/no-redirect/generic.http.html.headers": [
+ "c67e521584390fb6c068bcb1a814d73ed9543570",
+ "support"
+ ],
+ "referrer-policy/unsafe-url/http-rp/same-origin/http-http/a-tag/no-redirect/generic.http.html": [
+ "8dace8330263e75529ad1f94b4752c024a9c1488",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html": [
- "a40088b5b677ca84b1d0791f768281f302d90522",
+ "referrer-policy/unsafe-url/http-rp/same-origin/http-http/a-tag/no-redirect/generic.http.html.headers": [
+ "c67e521584390fb6c068bcb1a814d73ed9543570",
+ "support"
+ ],
+ "referrer-policy/unsafe-url/http-rp/same-origin/http-https/a-tag/no-redirect/generic.http.html": [
+ "1a03c3d9dde8b3ce49bc03e41116eff54cba3179",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html": [
- "763f6f02ee4e2f72c90a883afece94f53331806a",
+ "referrer-policy/unsafe-url/http-rp/same-origin/http-https/a-tag/no-redirect/generic.http.html.headers": [
+ "c67e521584390fb6c068bcb1a814d73ed9543570",
+ "support"
+ ],
+ "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/a-tag/no-redirect/generic.http.html": [
+ "1ed2a0198cad438b552305cd54f77223249a2002",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/module-worker/keep-origin-redirect/insecure-protocol.http.html": [
- "21065a0f8b5b95b73494788a1d1a422432e17584",
+ "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html": [
+ "cc71a6ca6896b0ed81f30adb0d0c1408631915eb",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/module-worker/no-redirect/insecure-protocol.http.html": [
- "21b9d284bfae0c8f67e742a931f2ed17847ed497",
+ "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/img-tag/no-redirect/generic.http.html": [
+ "18fa571fbf2d6b44cf6ff96096a5cc9bc6df8bf5",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html": [
- "6911528c08df17a1257a6f5d77036e51c20f0347",
+ "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html": [
+ "bbfd11f31feff89a66282043d560743696219b77",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html": [
- "cf7d1dd9c279a27ec972cb3c465e4f168b39bdae",
+ "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/a-tag/no-redirect/generic.http.html": [
+ "7b81605b86fcc1cd058c34446d2b92f0ff29d09d",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html": [
- "21882b16a44eccd2054e25bb79869e59f21d93d0",
+ "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html": [
+ "6a28a4c5e54771ec5a16a0034f6b2d26eed28592",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/shared-worker/keep-origin-redirect/insecure-protocol.http.html": [
- "0028373a419d443f55eb87bd20bf77126dfc49bb",
+ "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/img-tag/no-redirect/generic.http.html": [
+ "5c47aac9269384079e3d6b2f922e9ce25582aa1e",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/shared-worker/no-redirect/insecure-protocol.http.html": [
- "17eff8230843f649f38fcf2e13196997e5168a11",
+ "referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html": [
+ "c5367f0e3cb11180719119d78b45a590e35ba3be",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/worker-request/keep-origin-redirect/insecure-protocol.http.html": [
- "dfff2a541dc8cc5a369a85a440b86eb85bc01d3d",
+ "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/a-tag/no-redirect/generic.http.html": [
+ "cc66c5cacd183b3be962f7c0b0ee09c57e80f01f",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/worker-request/no-redirect/insecure-protocol.http.html": [
- "3c7cea5bca027ea0cf99d99894c7e289ac5ab270",
+ "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html": [
+ "07314409e95ce6c648bb02dff11bca5cc7d9a40a",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html": [
- "96971a833e3ac8259f269baf09dd9c2bf9db4d0c",
+ "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/img-tag/no-redirect/generic.http.html": [
+ "c6aafb2d30694b446d4c7f9c540f43218a13616a",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html": [
- "c98fa10e571784818b4e98efa4d7f87a88d4254f",
+ "referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html": [
+ "3e27d0de2aaceb936883489d2d79513c78ea227b",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html": [
- "4fe678652d0547e27cd21a375e799c0b5237f0ca",
+ "referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/a-tag/no-redirect/generic.http.html": [
+ "82055a7d4a265bdaaf5fd5f3b17da7710cbfee87",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
- "0f7f92fa9073418db035af3d3dbbcfbd7ac0d3ba",
+ "referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html": [
+ "a94a77be5677dcec6895b81e2227cd747208b159",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html": [
- "c2e04ad3614d825f572acaf798400519d46369b3",
+ "referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/img-tag/no-redirect/generic.http.html": [
+ "289d7ee4ee55e8def5deeff5bfd9858a8db504e4",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html": [
- "1aaa67c96d122b59dc70c098bbfad3d4e8178308",
+ "referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html": [
+ "e8314118acbebbf37b1f1727d571b4785471db60",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html": [
- "7af45bc8865786282b668007be8834c91cfddcda",
+ "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html": [
+ "f22c4142335834d6dd4cf8f59d7604491a8615cd",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "054b2eb241ab4c5801257e2e7a4dcb0907faee34",
+ "referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
+ "5f1e54d48dbef0d778a29e09c6ffa3572b958347",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html": [
- "faf51f1e759fc7060412ba330c8be0d5574e446c",
+ "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html": [
+ "155e9fb7bf2f9c867dfa38e43a09ae522a174ac1",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "a91416957959dd96a1a42291dbebc6f003c93c87",
+ "referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
+ "698f15f58c1dcdfab9ad090bfd8bfdd79de6c429",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "6242cbd961b784a3613f39946bf9f9c2ca45b147",
+ "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html": [
+ "989c847a5b903f6611db7a66418f7071a9cb8508",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
- "90eb85f139809e22b05b29772ddf1f44f22c6fda",
+ "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "cf7b83ef20a7d41c5fc8d5617d4519da8af9145d",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "74f43287d9b1a59a1c8f98b3b34bdb90f2e383d4",
+ "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html": [
+ "96f5f8c07a1d0b4172c9ee7e30d8254c4b108591",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html": [
- "53cdc7edf00539770febe12e7abaf95a74e3b2ce",
+ "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "8573cd5e8ee1547212c0afd5ca29eda46c27245f",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html": [
- "406ef5dff60559e9be4f0e1aad56b63c321d83d7",
+ "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
+ "c9b99a6b84184e1edfc8590311770c5d9466e921",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html": [
- "993c9ea86b19df0d8eddff027d154884197b87a9",
+ "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "0dcfaf498709fcbc66514794d237e8af41ece7cf",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html": [
- "d88b4994e32f0818db42e3ec40e0bde2c949b28f",
+ "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
+ "7f14e55c1314658193e256b21651129be80de31f",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html": [
- "e5a4240f5a4d052763d392d0f69d64936ee2175f",
+ "referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "1c44e334cfd1b9a7f8da224e5aaf53175264f040",
"testharness"
],
- "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html": [
- "834e2ef0101889b0c71934b2f0255bd7269c6a74",
+ "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html": [
+ "31ef25738901928642d370e856fb99428b10b15c",
+ "testharness"
+ ],
+ "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html": [
+ "bf7140a15d274fb1c7861a74e3089707dbcde37d",
+ "testharness"
+ ],
+ "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html": [
+ "a40088b5b677ca84b1d0791f768281f302d90522",
+ "testharness"
+ ],
+ "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html": [
+ "763f6f02ee4e2f72c90a883afece94f53331806a",
+ "testharness"
+ ],
+ "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html": [
+ "0f7f92fa9073418db035af3d3dbbcfbd7ac0d3ba",
+ "testharness"
+ ],
+ "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html": [
+ "6242cbd961b784a3613f39946bf9f9c2ca45b147",
+ "testharness"
+ ],
+ "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html": [
+ "90eb85f139809e22b05b29772ddf1f44f22c6fda",
+ "testharness"
+ ],
+ "referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html": [
+ "74f43287d9b1a59a1c8f98b3b34bdb90f2e383d4",
"testharness"
],
"remote-playback/META.yml": [
@@ -673766,7 +674542,7 @@
"support"
],
"resources/chromium/webxr-test.js": [
- "b52ee3bf32523e39d9619db8ede5b9b75c8a1501",
+ "73dda0920f12fb0f674f41765b27bd1c3c4a6b6a",
"support"
],
"resources/chromium/webxr-test.js.headers": [
@@ -675702,7 +676478,7 @@
"testharness"
],
"service-workers/service-worker/activation.https.html": [
- "5755758e5716dbc608e7e773bf9b83ab3f2f7e91",
+ "007ecaad76c95935dd57470c660575305dc6bae1",
"testharness"
],
"service-workers/service-worker/active.https.html": [
@@ -675822,7 +676598,7 @@
"testharness"
],
"service-workers/service-worker/detached-context.https.html": [
- "5ae4de8cc81e0c3650eaaf6b5656193d4a2cf8b0",
+ "f96370d201000d20a950166dccf2caf72bd473c1",
"testharness"
],
"service-workers/service-worker/embed-and-object-are-not-intercepted.https.html": [
@@ -678950,7 +679726,7 @@
"testharness"
],
"sms/interceptor.https.html": [
- "86b21922284f946a16bcd295a87851bee7569f9a",
+ "39b749b6d32c32a3254043067deb4dc695a0ad4d",
"testharness"
],
"sms/resources/iframe.html": [
@@ -678962,11 +679738,11 @@
"testharness"
],
"sms/sms_provider.js": [
- "4506135551c771d056dc202f06a4c00a7c31089f",
+ "11fd8466e986bd9e723791ea6d06f507a17e1247",
"support"
],
"sms/sms_receiver.idl": [
- "b71b6a3e0db2b74b127e4332cd83f218bb39d6aa",
+ "64048523f901f8509e85e4dc1ddc1f7c59ab3489",
"support"
],
"speech-api/META.yml": [
@@ -679853,6 +680629,10 @@
"7a9ad43dd98e00f7e2af4957365441a29aedf8e6",
"testharness"
],
+ "svg/animations/beginelement-instance-time-1.html": [
+ "aa1cb8c983d482439fccc6d91b50e69585f4d404",
+ "testharness"
+ ],
"svg/animations/change-css-property-while-animating-fill-freeze.html": [
"6774c3475a681f9fc91e8280ded739e9e65f4606",
"testharness"
@@ -680341,6 +681121,14 @@
"08c47454b6cb46887f6ab91c0e031d729538c572",
"testharness"
],
+ "svg/extensibility/foreignObject/masked-ref.html": [
+ "1a3b13c94516521266cf77e55abc11c3e81df8f8",
+ "support"
+ ],
+ "svg/extensibility/foreignObject/masked.html": [
+ "ad18e8931aa9bbbac967b4d0ae694d68e92dbbb2",
+ "reftest"
+ ],
"svg/extensibility/foreignObject/position-svg-root-in-foreign-object-ref.html": [
"668eb9b8c7e469540219b5ea9010db28239ae432",
"support"
@@ -683782,7 +684570,7 @@
"reftest"
],
"svg/struct/scripted/autofocus-attribute.svg": [
- "6c095a4bef5045d7aa19e8197ad3950448b166bc",
+ "d8f25741ee40cc488d504065548342c095cbc4c3",
"testharness"
],
"svg/struct/scripted/blank.svg": [
@@ -689290,7 +690078,7 @@
"support"
],
"tools/wpt/tests/test_wpt.py": [
- "04c0723aacb61e678b6481ecaf0d5de61789ad39",
+ "a2498333c2b51e7c985e28124d0c75a0fd5352c3",
"support"
],
"tools/wpt/tox.ini": [
@@ -690506,7 +691294,7 @@
"testharness"
],
"trusted-types/block-eval.tentative.html": [
- "e1a6a69accd1fa8ddaddd1c49970755a275bd8eb",
+ "cd4f5827c5331318a86dc71a42bc9eb037eb5b95",
"testharness"
],
"trusted-types/block-string-assignment-to-DOMParser-parseFromString.tentative.html": [
@@ -690566,7 +691354,7 @@
"testharness"
],
"trusted-types/eval-with-permissive-csp.tentative.html": [
- "68d119a520121f2c5a3f88028abcf657799b9123",
+ "25b4948c039c68c425e22f5e30ae4338327b6ce2",
"testharness"
],
"trusted-types/idlharness.window.js": [
@@ -690589,6 +691377,30 @@
"4079f7e9c7933cf9ee195fe0e7a54e0f56f184ab",
"support"
],
+ "trusted-types/trusted-types-eval-reporting-no-unsafe-eval.tentative.https.html": [
+ "f60bb9fe5140297b324e7e618c6c0230890feb30",
+ "testharness"
+ ],
+ "trusted-types/trusted-types-eval-reporting-no-unsafe-eval.tentative.https.html.headers": [
+ "4bc0bd3c1ab29d551a5e9988bde5a9dc8f6fa1a7",
+ "support"
+ ],
+ "trusted-types/trusted-types-eval-reporting-report-only.tentative.https.html": [
+ "1fb65459468d96f86e4a467aa8da2f3be489ae31",
+ "testharness"
+ ],
+ "trusted-types/trusted-types-eval-reporting-report-only.tentative.https.html.headers": [
+ "ba26c77fbf498385424205b8bff0c404f0f5357b",
+ "support"
+ ],
+ "trusted-types/trusted-types-eval-reporting.tentative.https.html": [
+ "309873cb1f8028ecb071ec5db3dfda62337e6b43",
+ "testharness"
+ ],
+ "trusted-types/trusted-types-eval-reporting.tentative.https.html.headers": [
+ "2e935f73a48c42346b6352fa6cd16d12294eebd8",
+ "support"
+ ],
"trusted-types/trusted-types-report-only.tentative.https.html": [
"f33183b4906975f03ebb3f3a21adb63839c89adb",
"testharness"
@@ -701626,7 +702438,7 @@
"testharness"
],
"webxr/xrSession_viewer_availability.https.html": [
- "686859166feb773c9f5701a801630359e7abdc4c",
+ "c509e5f1a2a992b9329fd55e591e37fcea2b6e91",
"testharness"
],
"webxr/xrSession_viewer_referenceSpace.https.html": [
diff --git a/tests/wpt/metadata/css/compositing/mix-blend-mode/mix-blend-mode-animation.html.ini b/tests/wpt/metadata/css/compositing/mix-blend-mode/mix-blend-mode-animation.html.ini
deleted file mode 100644
index 5496474410b..00000000000
--- a/tests/wpt/metadata/css/compositing/mix-blend-mode/mix-blend-mode-animation.html.ini
+++ /dev/null
@@ -1,2 +0,0 @@
-[mix-blend-mode-animation.html]
- expected: FAIL
diff --git a/tests/wpt/metadata/css/css-flexbox/flex-wrap-006.html.ini b/tests/wpt/metadata/css/css-flexbox/flex-wrap-006.html.ini
new file mode 100644
index 00000000000..2b2ae5489c3
--- /dev/null
+++ b/tests/wpt/metadata/css/css-flexbox/flex-wrap-006.html.ini
@@ -0,0 +1,2 @@
+[flex-wrap-006.html]
+ expected: FAIL
diff --git a/tests/wpt/metadata/css/cssom-view/matchMedia-display-none-iframe.html.ini b/tests/wpt/metadata/css/cssom-view/matchMedia-display-none-iframe.html.ini
deleted file mode 100644
index e6e1f29e274..00000000000
--- a/tests/wpt/metadata/css/cssom-view/matchMedia-display-none-iframe.html.ini
+++ /dev/null
@@ -1,2 +0,0 @@
-[matchMedia-display-none-iframe.html]
- expected: ERROR
diff --git a/tests/wpt/metadata/dom/idlharness.window.js.ini b/tests/wpt/metadata/dom/idlharness.window.js.ini
index 2561d3bc43d..2b018c8e4bd 100644
--- a/tests/wpt/metadata/dom/idlharness.window.js.ini
+++ b/tests/wpt/metadata/dom/idlharness.window.js.ini
@@ -529,3 +529,303 @@
[Element interface: element must inherit property "shadowRoot" with the proper type]
expected: FAIL
+ [XPathResult interface: attribute singleNodeValue]
+ expected: FAIL
+
+ [XPathExpression interface: existence and properties of interface object]
+ expected: FAIL
+
+ [Document interface: operation createNSResolver(Node)]
+ expected: FAIL
+
+ [XPathResult interface: document.evaluate("//*", document.body) must inherit property "BOOLEAN_TYPE" with the proper type]
+ expected: FAIL
+
+ [XPathEvaluator interface: existence and properties of interface prototype object's @@unscopables property]
+ expected: FAIL
+
+ [XPathResult interface: constant NUMBER_TYPE on interface object]
+ expected: FAIL
+
+ [XPathResult interface: constant ANY_TYPE on interface prototype object]
+ expected: FAIL
+
+ [XPathResult interface: constant STRING_TYPE on interface object]
+ expected: FAIL
+
+ [Document interface: xmlDoc must inherit property "createExpression(DOMString, XPathNSResolver)" with the proper type]
+ expected: FAIL
+
+ [Document interface: operation createExpression(DOMString, XPathNSResolver)]
+ expected: FAIL
+
+ [Document interface: new Document() must inherit property "evaluate(DOMString, Node, XPathNSResolver, unsigned short, XPathResult)" with the proper type]
+ expected: FAIL
+
+ [XPathEvaluator interface: operation createExpression(DOMString, XPathNSResolver)]
+ expected: FAIL
+
+ [XPathEvaluator interface: calling createExpression(DOMString, XPathNSResolver) on new XPathEvaluator() with too few arguments must throw TypeError]
+ expected: FAIL
+
+ [XPathResult interface: document.evaluate("//*", document.body) must inherit property "UNORDERED_NODE_ITERATOR_TYPE" with the proper type]
+ expected: FAIL
+
+ [XPathResult interface: attribute resultType]
+ expected: FAIL
+
+ [XPathResult interface: existence and properties of interface prototype object's "constructor" property]
+ expected: FAIL
+
+ [XPathExpression interface: calling evaluate(Node, unsigned short, XPathResult) on document.createExpression("//*") with too few arguments must throw TypeError]
+ expected: FAIL
+
+ [Document interface: xmlDoc must inherit property "createNSResolver(Node)" with the proper type]
+ expected: FAIL
+
+ [XPathResult interface: document.evaluate("//*", document.body) must inherit property "ORDERED_NODE_ITERATOR_TYPE" with the proper type]
+ expected: FAIL
+
+ [XPathResult interface: constant UNORDERED_NODE_ITERATOR_TYPE on interface prototype object]
+ expected: FAIL
+
+ [XPathResult interface: document.evaluate("//*", document.body) must inherit property "ANY_UNORDERED_NODE_TYPE" with the proper type]
+ expected: FAIL
+
+ [XPathResult interface: constant UNORDERED_NODE_SNAPSHOT_TYPE on interface prototype object]
+ expected: FAIL
+
+ [Document interface: operation evaluate(DOMString, Node, XPathNSResolver, unsigned short, XPathResult)]
+ expected: FAIL
+
+ [XPathEvaluator interface: operation createNSResolver(Node)]
+ expected: FAIL
+
+ [Stringification of document.evaluate("//*", document.body)]
+ expected: FAIL
+
+ [XPathResult interface: constant BOOLEAN_TYPE on interface object]
+ expected: FAIL
+
+ [XPathResult interface: operation snapshotItem(unsigned long)]
+ expected: FAIL
+
+ [XPathResult interface: existence and properties of interface prototype object]
+ expected: FAIL
+
+ [XPathResult interface: existence and properties of interface object]
+ expected: FAIL
+
+ [XPathEvaluator interface: existence and properties of interface prototype object's "constructor" property]
+ expected: FAIL
+
+ [XPathExpression interface: existence and properties of interface prototype object]
+ expected: FAIL
+
+ [XPathEvaluator interface: existence and properties of interface object]
+ expected: FAIL
+
+ [XPathResult interface: calling snapshotItem(unsigned long) on document.evaluate("//*", document.body) with too few arguments must throw TypeError]
+ expected: FAIL
+
+ [XPathResult interface: document.evaluate("//*", document.body) must inherit property "snapshotItem(unsigned long)" with the proper type]
+ expected: FAIL
+
+ [XPathEvaluator interface: new XPathEvaluator() must inherit property "createExpression(DOMString, XPathNSResolver)" with the proper type]
+ expected: FAIL
+
+ [Document interface: calling createNSResolver(Node) on new Document() with too few arguments must throw TypeError]
+ expected: FAIL
+
+ [XPathResult interface: constant ORDERED_NODE_ITERATOR_TYPE on interface prototype object]
+ expected: FAIL
+
+ [XPathResult interface object name]
+ expected: FAIL
+
+ [XPathResult interface: document.evaluate("//*", document.body) must inherit property "snapshotLength" with the proper type]
+ expected: FAIL
+
+ [XPathResult interface: document.evaluate("//*", document.body) must inherit property "invalidIteratorState" with the proper type]
+ expected: FAIL
+
+ [XPathExpression interface: existence and properties of interface prototype object's "constructor" property]
+ expected: FAIL
+
+ [XPathResult interface: constant ANY_UNORDERED_NODE_TYPE on interface prototype object]
+ expected: FAIL
+
+ [Document interface: calling createExpression(DOMString, XPathNSResolver) on new Document() with too few arguments must throw TypeError]
+ expected: FAIL
+
+ [Document interface: new Document() must inherit property "createExpression(DOMString, XPathNSResolver)" with the proper type]
+ expected: FAIL
+
+ [XPathResult interface object length]
+ expected: FAIL
+
+ [XPathResult interface: constant FIRST_ORDERED_NODE_TYPE on interface prototype object]
+ expected: FAIL
+
+ [XPathResult interface: document.evaluate("//*", document.body) must inherit property "numberValue" with the proper type]
+ expected: FAIL
+
+ [Stringification of document.createExpression("//*")]
+ expected: FAIL
+
+ [Document interface: calling evaluate(DOMString, Node, XPathNSResolver, unsigned short, XPathResult) on new Document() with too few arguments must throw TypeError]
+ expected: FAIL
+
+ [XPathExpression interface: document.createExpression("//*") must inherit property "evaluate(Node, unsigned short, XPathResult)" with the proper type]
+ expected: FAIL
+
+ [XPathResult interface: existence and properties of interface prototype object's @@unscopables property]
+ expected: FAIL
+
+ [XPathResult must be primary interface of document.evaluate("//*", document.body)]
+ expected: FAIL
+
+ [XPathResult interface: document.evaluate("//*", document.body) must inherit property "ANY_TYPE" with the proper type]
+ expected: FAIL
+
+ [Document interface: new Document() must inherit property "createNSResolver(Node)" with the proper type]
+ expected: FAIL
+
+ [XPathResult interface: attribute stringValue]
+ expected: FAIL
+
+ [XPathResult interface: attribute booleanValue]
+ expected: FAIL
+
+ [XPathExpression interface: operation evaluate(Node, unsigned short, XPathResult)]
+ expected: FAIL
+
+ [XPathResult interface: document.evaluate("//*", document.body) must inherit property "UNORDERED_NODE_SNAPSHOT_TYPE" with the proper type]
+ expected: FAIL
+
+ [Document interface: calling createNSResolver(Node) on xmlDoc with too few arguments must throw TypeError]
+ expected: FAIL
+
+ [XPathResult interface: document.evaluate("//*", document.body) must inherit property "booleanValue" with the proper type]
+ expected: FAIL
+
+ [XPathResult interface: constant ORDERED_NODE_SNAPSHOT_TYPE on interface prototype object]
+ expected: FAIL
+
+ [Document interface: calling createExpression(DOMString, XPathNSResolver) on xmlDoc with too few arguments must throw TypeError]
+ expected: FAIL
+
+ [XPathExpression interface object name]
+ expected: FAIL
+
+ [XPathResult interface: attribute snapshotLength]
+ expected: FAIL
+
+ [XPathEvaluator interface object length]
+ expected: FAIL
+
+ [XPathResult interface: document.evaluate("//*", document.body) must inherit property "STRING_TYPE" with the proper type]
+ expected: FAIL
+
+ [Document interface: xmlDoc must inherit property "evaluate(DOMString, Node, XPathNSResolver, unsigned short, XPathResult)" with the proper type]
+ expected: FAIL
+
+ [XPathResult interface: constant UNORDERED_NODE_SNAPSHOT_TYPE on interface object]
+ expected: FAIL
+
+ [XPathResult interface: document.evaluate("//*", document.body) must inherit property "stringValue" with the proper type]
+ expected: FAIL
+
+ [XPathResult interface: attribute invalidIteratorState]
+ expected: FAIL
+
+ [XPathResult interface: document.evaluate("//*", document.body) must inherit property "singleNodeValue" with the proper type]
+ expected: FAIL
+
+ [XPathResult interface: constant ORDERED_NODE_ITERATOR_TYPE on interface object]
+ expected: FAIL
+
+ [XPathEvaluator interface: new XPathEvaluator() must inherit property "evaluate(DOMString, Node, XPathNSResolver, unsigned short, XPathResult)" with the proper type]
+ expected: FAIL
+
+ [XPathResult interface: attribute numberValue]
+ expected: FAIL
+
+ [XPathResult interface: constant BOOLEAN_TYPE on interface prototype object]
+ expected: FAIL
+
+ [XPathResult interface: document.evaluate("//*", document.body) must inherit property "NUMBER_TYPE" with the proper type]
+ expected: FAIL
+
+ [XPathEvaluator interface object name]
+ expected: FAIL
+
+ [XPathResult interface: document.evaluate("//*", document.body) must inherit property "ORDERED_NODE_SNAPSHOT_TYPE" with the proper type]
+ expected: FAIL
+
+ [XPathEvaluator interface: calling evaluate(DOMString, Node, XPathNSResolver, unsigned short, XPathResult) on new XPathEvaluator() with too few arguments must throw TypeError]
+ expected: FAIL
+
+ [XPathExpression interface object length]
+ expected: FAIL
+
+ [Stringification of new XPathEvaluator()]
+ expected: FAIL
+
+ [XPathResult interface: constant ORDERED_NODE_SNAPSHOT_TYPE on interface object]
+ expected: FAIL
+
+ [XPathEvaluator interface: operation evaluate(DOMString, Node, XPathNSResolver, unsigned short, XPathResult)]
+ expected: FAIL
+
+ [XPathResult interface: document.evaluate("//*", document.body) must inherit property "resultType" with the proper type]
+ expected: FAIL
+
+ [XPathResult interface: constant ANY_UNORDERED_NODE_TYPE on interface object]
+ expected: FAIL
+
+ [XPathExpression must be primary interface of document.createExpression("//*")]
+ expected: FAIL
+
+ [XPathResult interface: constant NUMBER_TYPE on interface prototype object]
+ expected: FAIL
+
+ [Document interface: calling evaluate(DOMString, Node, XPathNSResolver, unsigned short, XPathResult) on xmlDoc with too few arguments must throw TypeError]
+ expected: FAIL
+
+ [XPathEvaluator must be primary interface of new XPathEvaluator()]
+ expected: FAIL
+
+ [XPathResult interface: operation iterateNext()]
+ expected: FAIL
+
+ [XPathEvaluator interface: new XPathEvaluator() must inherit property "createNSResolver(Node)" with the proper type]
+ expected: FAIL
+
+ [XPathResult interface: document.evaluate("//*", document.body) must inherit property "iterateNext()" with the proper type]
+ expected: FAIL
+
+ [XPathResult interface: constant UNORDERED_NODE_ITERATOR_TYPE on interface object]
+ expected: FAIL
+
+ [XPathResult interface: constant ANY_TYPE on interface object]
+ expected: FAIL
+
+ [XPathResult interface: constant FIRST_ORDERED_NODE_TYPE on interface object]
+ expected: FAIL
+
+ [XPathResult interface: constant STRING_TYPE on interface prototype object]
+ expected: FAIL
+
+ [XPathEvaluator interface: calling createNSResolver(Node) on new XPathEvaluator() with too few arguments must throw TypeError]
+ expected: FAIL
+
+ [XPathResult interface: document.evaluate("//*", document.body) must inherit property "FIRST_ORDERED_NODE_TYPE" with the proper type]
+ expected: FAIL
+
+ [XPathExpression interface: existence and properties of interface prototype object's @@unscopables property]
+ expected: FAIL
+
+ [XPathEvaluator interface: existence and properties of interface prototype object]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/fetch/content-type/response.window.js.ini b/tests/wpt/metadata/fetch/content-type/response.window.js.ini
index 8773af99c82..62c36a4da9a 100644
--- a/tests/wpt/metadata/fetch/content-type/response.window.js.ini
+++ b/tests/wpt/metadata/fetch/content-type/response.window.js.ini
@@ -312,15 +312,27 @@
[<iframe>: separate response Content-Type: */* text/html]
expected: FAIL
- [<iframe>: combined response Content-Type: text/html */*;charset=gbk]
+ [<iframe>: combined response Content-Type: text/html;" text/plain]
expected: FAIL
- [<iframe>: separate response Content-Type: text/plain */*;charset=gbk]
+ [<iframe>: combined response Content-Type: text/html;charset=gbk text/plain text/html]
expected: FAIL
- [<iframe>: combined response Content-Type: */* text/html]
+ [<iframe>: combined response Content-Type: text/html */*]
expected: FAIL
- [<iframe>: separate response Content-Type: text/html;x=" text/plain]
+ [<iframe>: separate response Content-Type: text/html */*;charset=gbk]
+ expected: FAIL
+
+ [<iframe>: separate response Content-Type: text/html */*]
+ expected: FAIL
+
+ [<iframe>: separate response Content-Type: text/plain */*]
+ expected: FAIL
+
+ [<iframe>: separate response Content-Type: text/html;" \\" text/plain]
+ expected: FAIL
+
+ [<iframe>: combined response Content-Type: text/html;x=" text/plain]
expected: FAIL
diff --git a/tests/wpt/metadata/fetch/content-type/script.window.js.ini b/tests/wpt/metadata/fetch/content-type/script.window.js.ini
index 279734168dc..2003288747e 100644
--- a/tests/wpt/metadata/fetch/content-type/script.window.js.ini
+++ b/tests/wpt/metadata/fetch/content-type/script.window.js.ini
@@ -56,6 +56,9 @@
[separate text/javascript x/x]
expected: FAIL
- [separate text/javascript;charset=windows-1252 text/javascript]
+ [separate text/javascript;charset=windows-1252 error text/javascript]
+ expected: FAIL
+
+ [separate text/javascript ]
expected: FAIL
diff --git a/tests/wpt/metadata/fetch/nosniff/parsing-nosniff.window.js.ini b/tests/wpt/metadata/fetch/nosniff/parsing-nosniff.window.js.ini
index 87c807a49ff..ef3edb78985 100644
--- a/tests/wpt/metadata/fetch/nosniff/parsing-nosniff.window.js.ini
+++ b/tests/wpt/metadata/fetch/nosniff/parsing-nosniff.window.js.ini
@@ -11,3 +11,6 @@
[X-Content-Type-Options%3A%20nosniff%0C]
expected: FAIL
+ [X-Content-Type-Options%3A%20%22nosniFF%22]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/fetch/sec-metadata/redirect/redirect-https-downgrade.tentative.sub.html.ini b/tests/wpt/metadata/fetch/sec-metadata/redirect/redirect-https-downgrade.tentative.sub.html.ini
index cffcb484703..b55e50b270b 100644
--- a/tests/wpt/metadata/fetch/sec-metadata/redirect/redirect-https-downgrade.tentative.sub.html.ini
+++ b/tests/wpt/metadata/fetch/sec-metadata/redirect/redirect-https-downgrade.tentative.sub.html.ini
@@ -1,5 +1,4 @@
[redirect-https-downgrade.tentative.sub.html]
- expected: ERROR
[Https downgrade fetch() api => No headers]
expected: NOTRUN
@@ -9,3 +8,6 @@
[Https downgrade embed => No headers]
expected: TIMEOUT
+ [redirect-https-downgrade]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/html/browsers/history/the-history-interface/traverse_the_history_1.html.ini b/tests/wpt/metadata/html/browsers/history/the-history-interface/traverse_the_history_1.html.ini
deleted file mode 100644
index 87b07c3e670..00000000000
--- a/tests/wpt/metadata/html/browsers/history/the-history-interface/traverse_the_history_1.html.ini
+++ /dev/null
@@ -1,4 +0,0 @@
-[traverse_the_history_1.html]
- [Multiple history traversals from the same task]
- expected: FAIL
-
diff --git a/tests/wpt/metadata/html/browsers/history/the-history-interface/traverse_the_history_3.html.ini b/tests/wpt/metadata/html/browsers/history/the-history-interface/traverse_the_history_3.html.ini
new file mode 100644
index 00000000000..51f8272a6de
--- /dev/null
+++ b/tests/wpt/metadata/html/browsers/history/the-history-interface/traverse_the_history_3.html.ini
@@ -0,0 +1,4 @@
+[traverse_the_history_3.html]
+ [Multiple history traversals, last would be aborted]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/html/browsers/history/the-history-interface/traverse_the_history_4.html.ini b/tests/wpt/metadata/html/browsers/history/the-history-interface/traverse_the_history_4.html.ini
new file mode 100644
index 00000000000..385376c7321
--- /dev/null
+++ b/tests/wpt/metadata/html/browsers/history/the-history-interface/traverse_the_history_4.html.ini
@@ -0,0 +1,4 @@
+[traverse_the_history_4.html]
+ [Multiple history traversals, last would be aborted]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/html/browsers/the-window-object/apis-for-creating-and-navigating-browsing-contexts-by-name/creating_browsing_context_test_01.html.ini b/tests/wpt/metadata/html/browsers/the-window-object/apis-for-creating-and-navigating-browsing-contexts-by-name/creating_browsing_context_test_01.html.ini
deleted file mode 100644
index 16fa2c5cfc1..00000000000
--- a/tests/wpt/metadata/html/browsers/the-window-object/apis-for-creating-and-navigating-browsing-contexts-by-name/creating_browsing_context_test_01.html.ini
+++ /dev/null
@@ -1,4 +0,0 @@
-[creating_browsing_context_test_01.html]
- [first argument: absolute url]
- expected: FAIL
-
diff --git a/tests/wpt/metadata/html/semantics/embedded-content/media-elements/media_fragment_seek.html.ini b/tests/wpt/metadata/html/semantics/embedded-content/media-elements/media_fragment_seek.html.ini
new file mode 100644
index 00000000000..b5a27414b21
--- /dev/null
+++ b/tests/wpt/metadata/html/semantics/embedded-content/media-elements/media_fragment_seek.html.ini
@@ -0,0 +1,4 @@
+[media_fragment_seek.html]
+ [Video should seek to time specified in media fragment syntax]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/html/semantics/forms/autofocus/autofocus-on-stable-document.html.ini b/tests/wpt/metadata/html/semantics/forms/autofocus/autofocus-on-stable-document.html.ini
new file mode 100644
index 00000000000..6e3cb66e530
--- /dev/null
+++ b/tests/wpt/metadata/html/semantics/forms/autofocus/autofocus-on-stable-document.html.ini
@@ -0,0 +1,4 @@
+[autofocus-on-stable-document.html]
+ [Autofocus should work if an element with autofocus is inserted into a document which was loaded some time ago.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/html/semantics/forms/autofocus/first-reconnected.html.ini b/tests/wpt/metadata/html/semantics/forms/autofocus/first-reconnected.html.ini
new file mode 100644
index 00000000000..706419d10e5
--- /dev/null
+++ b/tests/wpt/metadata/html/semantics/forms/autofocus/first-reconnected.html.ini
@@ -0,0 +1,4 @@
+[first-reconnected.html]
+ [The second autofocus element wins if the first autofocus element was disconnected and reconnected before flushing the autofocus candidates.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/html/semantics/forms/autofocus/first-when-later-but-before.html.ini b/tests/wpt/metadata/html/semantics/forms/autofocus/first-when-later-but-before.html.ini
index 14e8e7a41a9..ccfed6e9458 100644
--- a/tests/wpt/metadata/html/semantics/forms/autofocus/first-when-later-but-before.html.ini
+++ b/tests/wpt/metadata/html/semantics/forms/autofocus/first-when-later-but-before.html.ini
@@ -2,3 +2,6 @@
[The temporally first autofocus in the document wins, even if an element is inserted later that is previous in the document tree]
expected: FAIL
+ [The temporally first autofocus in the document wins, even if an element is inserted later that is previous in the document tree.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/html/semantics/forms/autofocus/first-when-later.html.ini b/tests/wpt/metadata/html/semantics/forms/autofocus/first-when-later.html.ini
index 54f8a845b52..5e21b9580c4 100644
--- a/tests/wpt/metadata/html/semantics/forms/autofocus/first-when-later.html.ini
+++ b/tests/wpt/metadata/html/semantics/forms/autofocus/first-when-later.html.ini
@@ -2,3 +2,6 @@
[The first autofocus in the document wins, even if elements are inserted later]
expected: FAIL
+ [The first autofocus in the document wins, even if elements are inserted later.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/html/semantics/forms/autofocus/first.html.ini b/tests/wpt/metadata/html/semantics/forms/autofocus/first.html.ini
index 9d0cf6ce24c..006e1c7bfc4 100644
--- a/tests/wpt/metadata/html/semantics/forms/autofocus/first.html.ini
+++ b/tests/wpt/metadata/html/semantics/forms/autofocus/first.html.ini
@@ -2,3 +2,6 @@
[The first autofocus in the document wins]
expected: FAIL
+ [The first autofocus element in the document should win.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/html/semantics/forms/autofocus/focusable-area-in-top-document.html.ini b/tests/wpt/metadata/html/semantics/forms/autofocus/focusable-area-in-top-document.html.ini
new file mode 100644
index 00000000000..e378aa9546e
--- /dev/null
+++ b/tests/wpt/metadata/html/semantics/forms/autofocus/focusable-area-in-top-document.html.ini
@@ -0,0 +1,4 @@
+[focusable-area-in-top-document.html]
+ [If topDocument's focused area is not topDocument, autofocus is not processed.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/html/semantics/forms/autofocus/queue-non-focusable.html.ini b/tests/wpt/metadata/html/semantics/forms/autofocus/queue-non-focusable.html.ini
new file mode 100644
index 00000000000..316185a1ce3
--- /dev/null
+++ b/tests/wpt/metadata/html/semantics/forms/autofocus/queue-non-focusable.html.ini
@@ -0,0 +1,4 @@
+[queue-non-focusable.html]
+ [If the first autofocus element is not focusable, but becomes focusable before a frame, it should be focused.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/html/semantics/forms/autofocus/skip-document-with-fragment.html.ini b/tests/wpt/metadata/html/semantics/forms/autofocus/skip-document-with-fragment.html.ini
new file mode 100644
index 00000000000..c12c0f8ae48
--- /dev/null
+++ b/tests/wpt/metadata/html/semantics/forms/autofocus/skip-document-with-fragment.html.ini
@@ -0,0 +1,4 @@
+[skip-document-with-fragment.html]
+ [Autofocus elements in iframed documents with URL fragments should be skipped.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/html/semantics/forms/autofocus/skip-non-focusable.html.ini b/tests/wpt/metadata/html/semantics/forms/autofocus/skip-non-focusable.html.ini
new file mode 100644
index 00000000000..a357d92b7c7
--- /dev/null
+++ b/tests/wpt/metadata/html/semantics/forms/autofocus/skip-non-focusable.html.ini
@@ -0,0 +1,4 @@
+[skip-non-focusable.html]
+ [Non-focusable autofocus element is skipped.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/html/semantics/forms/autofocus/spin-by-blocking-style-sheet.html.ini b/tests/wpt/metadata/html/semantics/forms/autofocus/spin-by-blocking-style-sheet.html.ini
new file mode 100644
index 00000000000..4805d3e402b
--- /dev/null
+++ b/tests/wpt/metadata/html/semantics/forms/autofocus/spin-by-blocking-style-sheet.html.ini
@@ -0,0 +1,5 @@
+[spin-by-blocking-style-sheet.html]
+ expected: TIMEOUT
+ [Script-blocking style sheet should pause flushing autofocus candidates.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/html/semantics/forms/autofocus/update-the-rendering.html.ini b/tests/wpt/metadata/html/semantics/forms/autofocus/update-the-rendering.html.ini
new file mode 100644
index 00000000000..72932af0b91
--- /dev/null
+++ b/tests/wpt/metadata/html/semantics/forms/autofocus/update-the-rendering.html.ini
@@ -0,0 +1,5 @@
+[update-the-rendering.html]
+ expected: TIMEOUT
+ ["Flush autofocus candidates" should be happen after the first animation frame callbacks, and before a resize event in the next iteration of window event loop.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/html/semantics/forms/constraints/form-validation-validity-rangeOverflow.html.ini b/tests/wpt/metadata/html/semantics/forms/constraints/form-validation-validity-rangeOverflow.html.ini
index 78f8de7d50a..788fc522460 100644
--- a/tests/wpt/metadata/html/semantics/forms/constraints/form-validation-validity-rangeOverflow.html.ini
+++ b/tests/wpt/metadata/html/semantics/forms/constraints/form-validation-validity-rangeOverflow.html.ini
@@ -225,3 +225,6 @@
[[INPUT in DATETIME-LOCAL status\] The value is greater than max(Year is 10000 should be valid)]
expected: FAIL
+ [[INPUT in NUMBER status\] The value is greater than max(special floating number)]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/html/semantics/forms/constraints/form-validation-validity-rangeUnderflow.html.ini b/tests/wpt/metadata/html/semantics/forms/constraints/form-validation-validity-rangeUnderflow.html.ini
index 851c76eeab1..351a2044700 100644
--- a/tests/wpt/metadata/html/semantics/forms/constraints/form-validation-validity-rangeUnderflow.html.ini
+++ b/tests/wpt/metadata/html/semantics/forms/constraints/form-validation-validity-rangeUnderflow.html.ini
@@ -219,3 +219,6 @@
[[INPUT in DATETIME-LOCAL status\] The value is greater than max]
expected: FAIL
+ [[INPUT in NUMBER status\] The value is less than min(special floating number)]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/html/semantics/forms/constraints/form-validation-validity-stepMismatch.html.ini b/tests/wpt/metadata/html/semantics/forms/constraints/form-validation-validity-stepMismatch.html.ini
index 4aeb80e612a..018bd5786f4 100644
--- a/tests/wpt/metadata/html/semantics/forms/constraints/form-validation-validity-stepMismatch.html.ini
+++ b/tests/wpt/metadata/html/semantics/forms/constraints/form-validation-validity-stepMismatch.html.ini
@@ -84,3 +84,9 @@
[[INPUT in NUMBER status\] The value must mismatch the step]
expected: FAIL
+ [[INPUT in NUMBER status\] The step attribute is not set and the value attribute is a floating number]
+ expected: FAIL
+
+ [[INPUT in NUMBER status\] The value attribute is empty string]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/html/semantics/forms/form-submission-0/form-submission-algorithm.html.ini b/tests/wpt/metadata/html/semantics/forms/form-submission-0/form-submission-algorithm.html.ini
index 702af61a3c4..127392316de 100644
--- a/tests/wpt/metadata/html/semantics/forms/form-submission-0/form-submission-algorithm.html.ini
+++ b/tests/wpt/metadata/html/semantics/forms/form-submission-0/form-submission-algorithm.html.ini
@@ -1,11 +1,7 @@
[form-submission-algorithm.html]
- expected: TIMEOUT
[If form's firing submission events is true, then return; 'submit' event]
expected: FAIL
[If form's firing submission events is true, then return; 'invalid' event]
expected: FAIL
- [Cannot navigate (after constructing the entry list)]
- expected: TIMEOUT
-
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..c194d827e38
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html.ini
@@ -0,0 +1,5 @@
+[cross-http.keep-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and keep-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..46f2b68fd65
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html.ini
@@ -0,0 +1,5 @@
+[cross-http.no-redirect.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and no-redirect redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..56c2d9c64f1
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html.ini
@@ -0,0 +1,5 @@
+[cross-http.swap-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and swap-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..9c5d31868b5
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html.ini
@@ -0,0 +1,5 @@
+[cross-https.keep-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and keep-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..bfbb8ae7066
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html.ini
@@ -0,0 +1,5 @@
+[cross-https.no-redirect.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and no-redirect redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..f77949cc3f7
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html.ini
@@ -0,0 +1,5 @@
+[cross-https.swap-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and swap-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..211a87d3a1f
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html.ini
@@ -0,0 +1,5 @@
+[same-http.keep-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..d9447183891
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html.ini
@@ -0,0 +1,5 @@
+[same-http.no-redirect.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..53959b4183b
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html.ini
@@ -0,0 +1,5 @@
+[same-http.swap-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and swap-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..04d531b6b0e
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html.ini
@@ -0,0 +1,5 @@
+[same-https.keep-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and keep-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..494b2e3e13d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html.ini
@@ -0,0 +1,5 @@
+[same-https.no-redirect.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and no-redirect redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..1ee4f68d38d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html.ini
@@ -0,0 +1,5 @@
+[same-https.swap-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and swap-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..fe1b0fb9f90
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-http.keep-origin.http.html.ini
@@ -0,0 +1,5 @@
+[cross-http.keep-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects omitted for img-tag to cross-http origin and keep-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..a4473db2774
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-http.no-redirect.http.html.ini
@@ -0,0 +1,5 @@
+[cross-http.no-redirect.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects omitted for img-tag to cross-http origin and no-redirect redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..d259098cd80
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-http.swap-origin.http.html.ini
@@ -0,0 +1,5 @@
+[cross-http.swap-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects omitted for img-tag to cross-http origin and swap-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..d4f814d7e1a
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-https.keep-origin.http.html.ini
@@ -0,0 +1,5 @@
+[cross-https.keep-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects omitted for img-tag to cross-https origin and keep-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..784cf56b93d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-https.no-redirect.http.html.ini
@@ -0,0 +1,5 @@
+[cross-https.no-redirect.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects omitted for img-tag to cross-https origin and no-redirect redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..181bfe092b1
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-https.swap-origin.http.html.ini
@@ -0,0 +1,5 @@
+[cross-https.swap-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects omitted for img-tag to cross-https origin and swap-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..2c8c363cc58
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-http.keep-origin.http.html.ini
@@ -0,0 +1,5 @@
+[same-http.keep-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects omitted for img-tag to same-http origin and keep-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..c8b0b1f0c54
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-http.no-redirect.http.html.ini
@@ -0,0 +1,5 @@
+[same-http.no-redirect.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects omitted for img-tag to same-http origin and no-redirect redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..c0c5af9d198
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-http.swap-origin.http.html.ini
@@ -0,0 +1,5 @@
+[same-http.swap-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects omitted for img-tag to same-http origin and swap-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..c19cd54f3dd
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-https.keep-origin.http.html.ini
@@ -0,0 +1,5 @@
+[same-https.keep-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects omitted for img-tag to same-https origin and keep-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..eb72ba556a6
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-https.no-redirect.http.html.ini
@@ -0,0 +1,5 @@
+[same-https.no-redirect.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects omitted for img-tag to same-https origin and no-redirect redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..822b58244e0
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-https.swap-origin.http.html.ini
@@ -0,0 +1,5 @@
+[same-https.swap-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects omitted for img-tag to same-https origin and swap-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..1a90831e924
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html.ini
@@ -0,0 +1,5 @@
+[cross-http.keep-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects origin for img-tag to cross-http origin and keep-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..f3940988185
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html.ini
@@ -0,0 +1,5 @@
+[cross-http.no-redirect.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects origin for img-tag to cross-http origin and no-redirect redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..bc3d2cd1e26
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html.ini
@@ -0,0 +1,5 @@
+[cross-http.swap-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects origin for img-tag to cross-http origin and swap-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..1c6e9fdc0ce
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html.ini
@@ -0,0 +1,5 @@
+[cross-https.keep-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects origin for img-tag to cross-https origin and keep-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..e06db34b1ff
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html.ini
@@ -0,0 +1,5 @@
+[cross-https.no-redirect.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects origin for img-tag to cross-https origin and no-redirect redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..98fd156c393
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html.ini
@@ -0,0 +1,5 @@
+[cross-https.swap-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects origin for img-tag to cross-https origin and swap-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..211a87d3a1f
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.ini
@@ -0,0 +1,5 @@
+[same-http.keep-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..d9447183891
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.ini
@@ -0,0 +1,5 @@
+[same-http.no-redirect.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..fd28ff237aa
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-http.swap-origin.http.html.ini
@@ -0,0 +1,5 @@
+[same-http.swap-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects origin for img-tag to same-http origin and swap-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..0620d7a5a4c
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-https.keep-origin.http.html.ini
@@ -0,0 +1,5 @@
+[same-https.keep-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects origin for img-tag to same-https origin and keep-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..3599926dfc4
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-https.no-redirect.http.html.ini
@@ -0,0 +1,5 @@
+[same-https.no-redirect.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects origin for img-tag to same-https origin and no-redirect redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..7c8b1a1c741
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-https.swap-origin.http.html.ini
@@ -0,0 +1,5 @@
+[same-https.swap-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects origin for img-tag to same-https origin and swap-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..1a90831e924
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-http.keep-origin.http.html.ini
@@ -0,0 +1,5 @@
+[cross-http.keep-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects origin for img-tag to cross-http origin and keep-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..f3940988185
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-http.no-redirect.http.html.ini
@@ -0,0 +1,5 @@
+[cross-http.no-redirect.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects origin for img-tag to cross-http origin and no-redirect redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..bc3d2cd1e26
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-http.swap-origin.http.html.ini
@@ -0,0 +1,5 @@
+[cross-http.swap-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects origin for img-tag to cross-http origin and swap-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..1c6e9fdc0ce
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-https.keep-origin.http.html.ini
@@ -0,0 +1,5 @@
+[cross-https.keep-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects origin for img-tag to cross-https origin and keep-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..e06db34b1ff
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-https.no-redirect.http.html.ini
@@ -0,0 +1,5 @@
+[cross-https.no-redirect.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects origin for img-tag to cross-https origin and no-redirect redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..98fd156c393
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-https.swap-origin.http.html.ini
@@ -0,0 +1,5 @@
+[cross-https.swap-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects origin for img-tag to cross-https origin and swap-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..4100a123a1b
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-http.keep-origin.http.html.ini
@@ -0,0 +1,5 @@
+[same-http.keep-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects origin for img-tag to same-http origin and keep-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..dd5bda1579d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-http.no-redirect.http.html.ini
@@ -0,0 +1,5 @@
+[same-http.no-redirect.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects origin for img-tag to same-http origin and no-redirect redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..fd28ff237aa
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-http.swap-origin.http.html.ini
@@ -0,0 +1,5 @@
+[same-http.swap-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects origin for img-tag to same-http origin and swap-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..0620d7a5a4c
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-https.keep-origin.http.html.ini
@@ -0,0 +1,5 @@
+[same-https.keep-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects origin for img-tag to same-https origin and keep-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..3599926dfc4
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-https.no-redirect.http.html.ini
@@ -0,0 +1,5 @@
+[same-https.no-redirect.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects origin for img-tag to same-https origin and no-redirect redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..7c8b1a1c741
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-https.swap-origin.http.html.ini
@@ -0,0 +1,5 @@
+[same-https.swap-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects origin for img-tag to same-https origin and swap-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..fe1b0fb9f90
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-http.keep-origin.http.html.ini
@@ -0,0 +1,5 @@
+[cross-http.keep-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects omitted for img-tag to cross-http origin and keep-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..a4473db2774
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-http.no-redirect.http.html.ini
@@ -0,0 +1,5 @@
+[cross-http.no-redirect.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects omitted for img-tag to cross-http origin and no-redirect redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..d259098cd80
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-http.swap-origin.http.html.ini
@@ -0,0 +1,5 @@
+[cross-http.swap-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects omitted for img-tag to cross-http origin and swap-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..d4f814d7e1a
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-https.keep-origin.http.html.ini
@@ -0,0 +1,5 @@
+[cross-https.keep-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects omitted for img-tag to cross-https origin and keep-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..784cf56b93d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-https.no-redirect.http.html.ini
@@ -0,0 +1,5 @@
+[cross-https.no-redirect.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects omitted for img-tag to cross-https origin and no-redirect redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..181bfe092b1
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-https.swap-origin.http.html.ini
@@ -0,0 +1,5 @@
+[cross-https.swap-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects omitted for img-tag to cross-https origin and swap-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..211a87d3a1f
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-http.keep-origin.http.html.ini
@@ -0,0 +1,5 @@
+[same-http.keep-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..d9447183891
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-http.no-redirect.http.html.ini
@@ -0,0 +1,5 @@
+[same-http.no-redirect.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..c0c5af9d198
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-http.swap-origin.http.html.ini
@@ -0,0 +1,5 @@
+[same-http.swap-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects omitted for img-tag to same-http origin and swap-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..822b58244e0
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-https.swap-origin.http.html.ini
@@ -0,0 +1,5 @@
+[same-https.swap-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects omitted for img-tag to same-https origin and swap-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..1a90831e924
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html.ini
@@ -0,0 +1,5 @@
+[cross-http.keep-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects origin for img-tag to cross-http origin and keep-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..f3940988185
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html.ini
@@ -0,0 +1,5 @@
+[cross-http.no-redirect.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects origin for img-tag to cross-http origin and no-redirect redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..bc3d2cd1e26
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html.ini
@@ -0,0 +1,5 @@
+[cross-http.swap-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects origin for img-tag to cross-http origin and swap-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..1c6e9fdc0ce
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html.ini
@@ -0,0 +1,5 @@
+[cross-https.keep-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects origin for img-tag to cross-https origin and keep-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..e06db34b1ff
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html.ini
@@ -0,0 +1,5 @@
+[cross-https.no-redirect.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects origin for img-tag to cross-https origin and no-redirect redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..98fd156c393
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html.ini
@@ -0,0 +1,5 @@
+[cross-https.swap-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects origin for img-tag to cross-https origin and swap-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..211a87d3a1f
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.ini
@@ -0,0 +1,5 @@
+[same-http.keep-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..d9447183891
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.ini
@@ -0,0 +1,5 @@
+[same-http.no-redirect.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..fd28ff237aa
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-http.swap-origin.http.html.ini
@@ -0,0 +1,5 @@
+[same-http.swap-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects origin for img-tag to same-http origin and swap-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..0620d7a5a4c
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-https.keep-origin.http.html.ini
@@ -0,0 +1,5 @@
+[same-https.keep-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects origin for img-tag to same-https origin and keep-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..3599926dfc4
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-https.no-redirect.http.html.ini
@@ -0,0 +1,5 @@
+[same-https.no-redirect.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects origin for img-tag to same-https origin and no-redirect redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..7c8b1a1c741
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-https.swap-origin.http.html.ini
@@ -0,0 +1,5 @@
+[same-https.swap-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects origin for img-tag to same-https origin and swap-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..1a90831e924
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-http.keep-origin.http.html.ini
@@ -0,0 +1,5 @@
+[cross-http.keep-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects origin for img-tag to cross-http origin and keep-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..f3940988185
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-http.no-redirect.http.html.ini
@@ -0,0 +1,5 @@
+[cross-http.no-redirect.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects origin for img-tag to cross-http origin and no-redirect redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..bc3d2cd1e26
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-http.swap-origin.http.html.ini
@@ -0,0 +1,5 @@
+[cross-http.swap-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects origin for img-tag to cross-http origin and swap-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..1c6e9fdc0ce
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-https.keep-origin.http.html.ini
@@ -0,0 +1,5 @@
+[cross-https.keep-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects origin for img-tag to cross-https origin and keep-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..e06db34b1ff
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-https.no-redirect.http.html.ini
@@ -0,0 +1,5 @@
+[cross-https.no-redirect.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects origin for img-tag to cross-https origin and no-redirect redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..98fd156c393
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-https.swap-origin.http.html.ini
@@ -0,0 +1,5 @@
+[cross-https.swap-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects origin for img-tag to cross-https origin and swap-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..4100a123a1b
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-http.keep-origin.http.html.ini
@@ -0,0 +1,5 @@
+[same-http.keep-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects origin for img-tag to same-http origin and keep-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..dd5bda1579d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-http.no-redirect.http.html.ini
@@ -0,0 +1,5 @@
+[same-http.no-redirect.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects origin for img-tag to same-http origin and no-redirect redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..fd28ff237aa
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-http.swap-origin.http.html.ini
@@ -0,0 +1,5 @@
+[same-http.swap-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects origin for img-tag to same-http origin and swap-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..0620d7a5a4c
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-https.keep-origin.http.html.ini
@@ -0,0 +1,5 @@
+[same-https.keep-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects origin for img-tag to same-https origin and keep-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..3599926dfc4
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-https.no-redirect.http.html.ini
@@ -0,0 +1,5 @@
+[same-https.no-redirect.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects origin for img-tag to same-https origin and no-redirect redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..7c8b1a1c741
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-https.swap-origin.http.html.ini
@@ -0,0 +1,5 @@
+[same-https.swap-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects origin for img-tag to same-https origin and swap-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..c194d827e38
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html.ini
@@ -0,0 +1,5 @@
+[cross-http.keep-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and keep-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..46f2b68fd65
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html.ini
@@ -0,0 +1,5 @@
+[cross-http.no-redirect.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and no-redirect redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..56c2d9c64f1
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html.ini
@@ -0,0 +1,5 @@
+[cross-http.swap-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and swap-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..9c5d31868b5
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html.ini
@@ -0,0 +1,5 @@
+[cross-https.keep-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and keep-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..bfbb8ae7066
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html.ini
@@ -0,0 +1,5 @@
+[cross-https.no-redirect.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and no-redirect redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..f77949cc3f7
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html.ini
@@ -0,0 +1,5 @@
+[cross-https.swap-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and swap-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..211a87d3a1f
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html.ini
@@ -0,0 +1,5 @@
+[same-http.keep-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..d9447183891
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html.ini
@@ -0,0 +1,5 @@
+[same-http.no-redirect.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..53959b4183b
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html.ini
@@ -0,0 +1,5 @@
+[same-http.swap-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and swap-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..04d531b6b0e
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html.ini
@@ -0,0 +1,5 @@
+[same-https.keep-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and keep-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..494b2e3e13d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html.ini
@@ -0,0 +1,5 @@
+[same-https.no-redirect.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and no-redirect redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..1ee4f68d38d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html.ini
@@ -0,0 +1,5 @@
+[same-https.swap-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and swap-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..c194d827e38
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-http.keep-origin.http.html.ini
@@ -0,0 +1,5 @@
+[cross-http.keep-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and keep-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..46f2b68fd65
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-http.no-redirect.http.html.ini
@@ -0,0 +1,5 @@
+[cross-http.no-redirect.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and no-redirect redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..56c2d9c64f1
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-http.swap-origin.http.html.ini
@@ -0,0 +1,5 @@
+[cross-http.swap-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and swap-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..9c5d31868b5
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-https.keep-origin.http.html.ini
@@ -0,0 +1,5 @@
+[cross-https.keep-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and keep-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..bfbb8ae7066
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-https.no-redirect.http.html.ini
@@ -0,0 +1,5 @@
+[cross-https.no-redirect.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and no-redirect redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..f77949cc3f7
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-https.swap-origin.http.html.ini
@@ -0,0 +1,5 @@
+[cross-https.swap-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and swap-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..211a87d3a1f
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/same-http.keep-origin.http.html.ini
@@ -0,0 +1,5 @@
+[same-http.keep-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..d9447183891
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/same-http.no-redirect.http.html.ini
@@ -0,0 +1,5 @@
+[same-http.no-redirect.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/same-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..53959b4183b
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/same-http.swap-origin.http.html.ini
@@ -0,0 +1,5 @@
+[same-http.swap-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and swap-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/same-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..04d531b6b0e
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/same-https.keep-origin.http.html.ini
@@ -0,0 +1,5 @@
+[same-https.keep-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and keep-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/same-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..494b2e3e13d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/same-https.no-redirect.http.html.ini
@@ -0,0 +1,5 @@
+[same-https.no-redirect.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and no-redirect redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/same-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..1ee4f68d38d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/same-https.swap-origin.http.html.ini
@@ -0,0 +1,5 @@
+[same-https.swap-origin.http.html]
+ expected: TIMEOUT
+ [Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and swap-origin redirection from http context.]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..3d792c4afad
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[cross-http.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..09d2d65d211
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[cross-http.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..c7e624f83f2
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html.ini
@@ -0,0 +1,13 @@
+[cross-http.swap-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and swap-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..9d2b936da93
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[cross-https.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..2baaf093e91
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[cross-https.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..6fbf1667b8d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html.ini
@@ -0,0 +1,13 @@
+[cross-https.swap-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and swap-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..37e1f75f066
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..82ffc69787e
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..017dda0f39d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.swap-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to same-http origin and swap-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..af7a0aef4c2
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-https.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to same-https origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..9db6958df9f
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[same-https.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to same-https origin and no-redirect redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..420328972f0
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-https.swap-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to same-https origin and swap-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..25a038541de
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html.ini
@@ -0,0 +1,2 @@
+[cross-http.keep-origin.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..74140791be9
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html.ini
@@ -0,0 +1,2 @@
+[cross-http.no-redirect.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..2246f24c8e5
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html.ini
@@ -0,0 +1,2 @@
+[cross-http.swap-origin.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..b1c78d9f900
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html.ini
@@ -0,0 +1,2 @@
+[cross-https.keep-origin.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..ddcac5363f5
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html.ini
@@ -0,0 +1,2 @@
+[cross-https.no-redirect.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..ccdb0672911
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html.ini
@@ -0,0 +1,2 @@
+[cross-https.swap-origin.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..2ef9bb3125d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html.ini
@@ -0,0 +1,2 @@
+[same-http.keep-origin.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..c20cd1f853f
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html.ini
@@ -0,0 +1,2 @@
+[same-http.no-redirect.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..6c30b034106
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html.ini
@@ -0,0 +1,2 @@
+[same-http.swap-origin.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..6a19cec8f34
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html.ini
@@ -0,0 +1,2 @@
+[same-https.keep-origin.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..09ce0ba8f5b
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html.ini
@@ -0,0 +1,2 @@
+[same-https.no-redirect.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..8a2333cfe1d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html.ini
@@ -0,0 +1,2 @@
+[same-https.swap-origin.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..d504364cd66
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[cross-http.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..5960a16e8a5
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[cross-http.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..ce8730853a1
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html.ini
@@ -0,0 +1,13 @@
+[cross-http.swap-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and swap-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..e4f7468d2f3
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[cross-https.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..9b13306ab27
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[cross-https.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and no-redirect redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..f7ff97ef2e1
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html.ini
@@ -0,0 +1,13 @@
+[cross-https.swap-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and swap-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..2ed4a610b1b
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..854bdaaae87
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..1566810adc6
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.swap-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and swap-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..78b04936326
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-https.keep-origin.http.html]
+ [Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..c9765708e4e
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[same-https.no-redirect.http.html]
+ [Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and no-redirect redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..696faf157ff
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-https.swap-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and swap-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..41efbaa64d7
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.keep-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..68bde792a04
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.no-redirect.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..2d7cf8eae9e
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.swap-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..5f5bde466bf
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.keep-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..697b1c45e29
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.no-redirect.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..281f2b968ea
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.swap-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..9f3259468a5
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..abfd4e5a022
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..e26de23b9f1
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.swap-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..ebdb0e600dd
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.keep-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..6e6321f5809
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.no-redirect.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..6f1817b75a0
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.swap-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..71546d2db87
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..da0fa8bf260
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..38dade49ba3
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..da70e9cc9bd
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..01b669910d2
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..eeacd36ea1d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..41efbaa64d7
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.keep-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..68bde792a04
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.no-redirect.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..2d7cf8eae9e
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.swap-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..5f5bde466bf
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.keep-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..697b1c45e29
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.no-redirect.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..281f2b968ea
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.swap-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..9f3259468a5
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..abfd4e5a022
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..e26de23b9f1
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.swap-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..ebdb0e600dd
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.keep-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..6e6321f5809
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.no-redirect.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..6f1817b75a0
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.swap-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..45a5f36a4cf
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.keep-origin.http.html]
+ [Referrer Policy: Expects omitted for img-tag to cross-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..8ed3e17262e
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.no-redirect.http.html]
+ [Referrer Policy: Expects omitted for img-tag to cross-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..5fbb2a57f68
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-https.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.keep-origin.http.html]
+ [Referrer Policy: Expects omitted for img-tag to cross-https origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..5e33597fc61
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-https.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.no-redirect.http.html]
+ [Referrer Policy: Expects omitted for img-tag to cross-https origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..43b811027e0
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-https.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.swap-origin.http.html]
+ [Referrer Policy: Expects omitted for img-tag to cross-https origin and swap-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..03e0b9807f6
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-http.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.swap-origin.http.html]
+ [Referrer Policy: Expects omitted for img-tag to same-http origin and swap-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..dff03f99b98
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-https.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.keep-origin.http.html]
+ [Referrer Policy: Expects omitted for img-tag to same-https origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..a9ec4e797b4
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-https.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.no-redirect.http.html]
+ [Referrer Policy: Expects omitted for img-tag to same-https origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..044afe14bf4
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-https.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.swap-origin.http.html]
+ [Referrer Policy: Expects omitted for img-tag to same-https origin and swap-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer/sharedworker-classic/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer/sharedworker-classic/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..1769b2580b4
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer/sharedworker-classic/same-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.keep-origin.http.html]
+ [Referrer Policy: Expects omitted for sharedworker-classic to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer/sharedworker-classic/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer/sharedworker-classic/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..e529a4801cd
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer/sharedworker-classic/same-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.no-redirect.http.html]
+ [Referrer Policy: Expects omitted for sharedworker-classic to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..0d9c9ff0afa
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.keep-origin.http.html]
+ [Referrer Policy: Expects origin for fetch to cross-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..3d593d8b0b9
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.no-redirect.http.html]
+ [Referrer Policy: Expects origin for fetch to cross-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..79eae6e3b9d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.swap-origin.http.html]
+ [Referrer Policy: Expects origin for fetch to cross-http origin and swap-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..2911a9e60a5
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.keep-origin.http.html]
+ [Referrer Policy: Expects origin for fetch to cross-https origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..5ea4a082de3
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.no-redirect.http.html]
+ [Referrer Policy: Expects origin for fetch to cross-https origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..280a8921247
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.swap-origin.http.html]
+ [Referrer Policy: Expects origin for fetch to cross-https origin and swap-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..37e1f75f066
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..82ffc69787e
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..9abdc225d4a
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.swap-origin.http.html]
+ [Referrer Policy: Expects origin for fetch to same-http origin and swap-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..d204df6ff1e
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-https.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.keep-origin.http.html]
+ [Referrer Policy: Expects origin for fetch to same-https origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..837ba368f4d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-https.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.no-redirect.http.html]
+ [Referrer Policy: Expects origin for fetch to same-https origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..0c4227c0aff
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-https.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.swap-origin.http.html]
+ [Referrer Policy: Expects origin for fetch to same-https origin and swap-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..2ef9bb3125d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.ini
@@ -0,0 +1,2 @@
+[same-http.keep-origin.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..c20cd1f853f
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.ini
@@ -0,0 +1,2 @@
+[same-http.no-redirect.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..358acfa9e3d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.keep-origin.http.html]
+ [Referrer Policy: Expects origin for img-tag to cross-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..88098c53a70
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.no-redirect.http.html]
+ [Referrer Policy: Expects origin for img-tag to cross-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..fdc78287b2f
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.swap-origin.http.html]
+ [Referrer Policy: Expects origin for img-tag to cross-http origin and swap-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..1ef2b4acd86
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.keep-origin.http.html]
+ [Referrer Policy: Expects origin for img-tag to cross-https origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..f8a94a488bd
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.no-redirect.http.html]
+ [Referrer Policy: Expects origin for img-tag to cross-https origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..b5f9a3e23c4
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.swap-origin.http.html]
+ [Referrer Policy: Expects origin for img-tag to cross-https origin and swap-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..2ed4a610b1b
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..854bdaaae87
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..dc161000188
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.swap-origin.http.html]
+ [Referrer Policy: Expects origin for img-tag to same-http origin and swap-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..99de401fdb1
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-https.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.keep-origin.http.html]
+ [Referrer Policy: Expects origin for img-tag to same-https origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..5ac598c79b4
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-https.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.no-redirect.http.html]
+ [Referrer Policy: Expects origin for img-tag to same-https origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..f82362f5401
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-https.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.swap-origin.http.html]
+ [Referrer Policy: Expects origin for img-tag to same-https origin and swap-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..9f3259468a5
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..abfd4e5a022
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..71546d2db87
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..da0fa8bf260
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..38dade49ba3
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..da70e9cc9bd
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..01b669910d2
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..eeacd36ea1d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..9f3259468a5
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..abfd4e5a022
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/fetch/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/fetch/cross-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..0d9c9ff0afa
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/fetch/cross-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.keep-origin.http.html]
+ [Referrer Policy: Expects origin for fetch to cross-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/fetch/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/fetch/cross-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..3d593d8b0b9
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/fetch/cross-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.no-redirect.http.html]
+ [Referrer Policy: Expects origin for fetch to cross-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/fetch/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/fetch/cross-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..79eae6e3b9d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/fetch/cross-http.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.swap-origin.http.html]
+ [Referrer Policy: Expects origin for fetch to cross-http origin and swap-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/fetch/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/fetch/cross-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..2911a9e60a5
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/fetch/cross-https.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.keep-origin.http.html]
+ [Referrer Policy: Expects origin for fetch to cross-https origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/fetch/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/fetch/cross-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..5ea4a082de3
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/fetch/cross-https.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.no-redirect.http.html]
+ [Referrer Policy: Expects origin for fetch to cross-https origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/fetch/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/fetch/cross-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..280a8921247
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/fetch/cross-https.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.swap-origin.http.html]
+ [Referrer Policy: Expects origin for fetch to cross-https origin and swap-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/fetch/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/fetch/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..e821f119755
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/fetch/same-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.keep-origin.http.html]
+ [Referrer Policy: Expects origin for fetch to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/fetch/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/fetch/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..d52522e6f1b
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/fetch/same-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.no-redirect.http.html]
+ [Referrer Policy: Expects origin for fetch to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/fetch/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/fetch/same-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..9abdc225d4a
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/fetch/same-http.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.swap-origin.http.html]
+ [Referrer Policy: Expects origin for fetch to same-http origin and swap-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/fetch/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/fetch/same-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..d204df6ff1e
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/fetch/same-https.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.keep-origin.http.html]
+ [Referrer Policy: Expects origin for fetch to same-https origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/fetch/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/fetch/same-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..837ba368f4d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/fetch/same-https.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.no-redirect.http.html]
+ [Referrer Policy: Expects origin for fetch to same-https origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/fetch/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/fetch/same-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..0c4227c0aff
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/fetch/same-https.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.swap-origin.http.html]
+ [Referrer Policy: Expects origin for fetch to same-https origin and swap-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/img-tag/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/img-tag/cross-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..358acfa9e3d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/img-tag/cross-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.keep-origin.http.html]
+ [Referrer Policy: Expects origin for img-tag to cross-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/img-tag/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/img-tag/cross-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..88098c53a70
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/img-tag/cross-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.no-redirect.http.html]
+ [Referrer Policy: Expects origin for img-tag to cross-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/img-tag/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/img-tag/cross-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..fdc78287b2f
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/img-tag/cross-http.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.swap-origin.http.html]
+ [Referrer Policy: Expects origin for img-tag to cross-http origin and swap-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/img-tag/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/img-tag/cross-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..1ef2b4acd86
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/img-tag/cross-https.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.keep-origin.http.html]
+ [Referrer Policy: Expects origin for img-tag to cross-https origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/img-tag/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/img-tag/cross-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..f8a94a488bd
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/img-tag/cross-https.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.no-redirect.http.html]
+ [Referrer Policy: Expects origin for img-tag to cross-https origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/img-tag/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/img-tag/cross-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..b5f9a3e23c4
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/img-tag/cross-https.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.swap-origin.http.html]
+ [Referrer Policy: Expects origin for img-tag to cross-https origin and swap-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/img-tag/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/img-tag/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..a51b9ca809f
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/img-tag/same-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.keep-origin.http.html]
+ [Referrer Policy: Expects origin for img-tag to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/img-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/img-tag/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..120396a21dc
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/img-tag/same-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.no-redirect.http.html]
+ [Referrer Policy: Expects origin for img-tag to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/img-tag/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/img-tag/same-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..dc161000188
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/img-tag/same-http.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.swap-origin.http.html]
+ [Referrer Policy: Expects origin for img-tag to same-http origin and swap-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/img-tag/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/img-tag/same-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..99de401fdb1
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/img-tag/same-https.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.keep-origin.http.html]
+ [Referrer Policy: Expects origin for img-tag to same-https origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/img-tag/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/img-tag/same-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..5ac598c79b4
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/img-tag/same-https.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.no-redirect.http.html]
+ [Referrer Policy: Expects origin for img-tag to same-https origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/img-tag/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/img-tag/same-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..f82362f5401
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/img-tag/same-https.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.swap-origin.http.html]
+ [Referrer Policy: Expects origin for img-tag to same-https origin and swap-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/sharedworker-classic/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/sharedworker-classic/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..10ed4751d38
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/sharedworker-classic/same-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.keep-origin.http.html]
+ [Referrer Policy: Expects origin for sharedworker-classic to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/sharedworker-classic/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/sharedworker-classic/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..3f3d2028ec1
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/sharedworker-classic/same-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.no-redirect.http.html]
+ [Referrer Policy: Expects origin for sharedworker-classic to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/worker-classic/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/worker-classic/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..db5928d7021
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/worker-classic/same-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.keep-origin.http.html]
+ [Referrer Policy: Expects origin for worker-classic to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/worker-classic/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/worker-classic/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..b53b10f4a28
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/worker-classic/same-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.no-redirect.http.html]
+ [Referrer Policy: Expects origin for worker-classic to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/worker-module/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/worker-module/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..c332d93674e
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/worker-module/same-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.keep-origin.http.html]
+ [Referrer Policy: Expects origin for worker-module to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/worker-module/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/worker-module/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..e56c7152d59
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/worker-module/same-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.no-redirect.http.html]
+ [Referrer Policy: Expects origin for worker-module to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/fetch/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/fetch/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..37e1f75f066
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/fetch/same-http.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/fetch/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/fetch/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..82ffc69787e
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/fetch/same-http.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..2ef9bb3125d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html.ini
@@ -0,0 +1,2 @@
+[same-http.keep-origin.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..c20cd1f853f
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html.ini
@@ -0,0 +1,2 @@
+[same-http.no-redirect.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..45a5f36a4cf
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.keep-origin.http.html]
+ [Referrer Policy: Expects omitted for img-tag to cross-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..8ed3e17262e
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.no-redirect.http.html]
+ [Referrer Policy: Expects omitted for img-tag to cross-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..5fbb2a57f68
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-https.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.keep-origin.http.html]
+ [Referrer Policy: Expects omitted for img-tag to cross-https origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..5e33597fc61
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-https.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.no-redirect.http.html]
+ [Referrer Policy: Expects omitted for img-tag to cross-https origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..43b811027e0
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-https.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.swap-origin.http.html]
+ [Referrer Policy: Expects omitted for img-tag to cross-https origin and swap-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/img-tag/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/img-tag/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..2ed4a610b1b
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/img-tag/same-http.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/img-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/img-tag/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..854bdaaae87
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/img-tag/same-http.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/img-tag/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/img-tag/same-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..03e0b9807f6
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/img-tag/same-http.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.swap-origin.http.html]
+ [Referrer Policy: Expects omitted for img-tag to same-http origin and swap-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/img-tag/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/img-tag/same-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..044afe14bf4
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/img-tag/same-https.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.swap-origin.http.html]
+ [Referrer Policy: Expects omitted for img-tag to same-https origin and swap-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/script-tag/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/script-tag/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..9f3259468a5
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/script-tag/same-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/script-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/script-tag/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..abfd4e5a022
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/script-tag/same-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..71546d2db87
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..da0fa8bf260
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..38dade49ba3
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..da70e9cc9bd
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/worker-module/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/worker-module/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..01b669910d2
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/worker-module/same-http.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/worker-module/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/worker-module/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..eeacd36ea1d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/worker-module/same-http.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/xhr/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/xhr/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..9f3259468a5
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/xhr/same-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/xhr/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/xhr/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..abfd4e5a022
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/xhr/same-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..0d9c9ff0afa
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.keep-origin.http.html]
+ [Referrer Policy: Expects origin for fetch to cross-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..3d593d8b0b9
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.no-redirect.http.html]
+ [Referrer Policy: Expects origin for fetch to cross-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..79eae6e3b9d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.swap-origin.http.html]
+ [Referrer Policy: Expects origin for fetch to cross-http origin and swap-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..2911a9e60a5
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.keep-origin.http.html]
+ [Referrer Policy: Expects origin for fetch to cross-https origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..5ea4a082de3
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.no-redirect.http.html]
+ [Referrer Policy: Expects origin for fetch to cross-https origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..280a8921247
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.swap-origin.http.html]
+ [Referrer Policy: Expects origin for fetch to cross-https origin and swap-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..37e1f75f066
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..82ffc69787e
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..9abdc225d4a
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.swap-origin.http.html]
+ [Referrer Policy: Expects origin for fetch to same-http origin and swap-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..d204df6ff1e
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.keep-origin.http.html]
+ [Referrer Policy: Expects origin for fetch to same-https origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..837ba368f4d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.no-redirect.http.html]
+ [Referrer Policy: Expects origin for fetch to same-https origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..0c4227c0aff
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.swap-origin.http.html]
+ [Referrer Policy: Expects origin for fetch to same-https origin and swap-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..2ef9bb3125d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.ini
@@ -0,0 +1,2 @@
+[same-http.keep-origin.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..c20cd1f853f
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.ini
@@ -0,0 +1,2 @@
+[same-http.no-redirect.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..358acfa9e3d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.keep-origin.http.html]
+ [Referrer Policy: Expects origin for img-tag to cross-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..88098c53a70
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.no-redirect.http.html]
+ [Referrer Policy: Expects origin for img-tag to cross-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..fdc78287b2f
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.swap-origin.http.html]
+ [Referrer Policy: Expects origin for img-tag to cross-http origin and swap-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..1ef2b4acd86
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.keep-origin.http.html]
+ [Referrer Policy: Expects origin for img-tag to cross-https origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..f8a94a488bd
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.no-redirect.http.html]
+ [Referrer Policy: Expects origin for img-tag to cross-https origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..b5f9a3e23c4
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.swap-origin.http.html]
+ [Referrer Policy: Expects origin for img-tag to cross-https origin and swap-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..2ed4a610b1b
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..854bdaaae87
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..dc161000188
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.swap-origin.http.html]
+ [Referrer Policy: Expects origin for img-tag to same-http origin and swap-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..99de401fdb1
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-https.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.keep-origin.http.html]
+ [Referrer Policy: Expects origin for img-tag to same-https origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..5ac598c79b4
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-https.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.no-redirect.http.html]
+ [Referrer Policy: Expects origin for img-tag to same-https origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..f82362f5401
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-https.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.swap-origin.http.html]
+ [Referrer Policy: Expects origin for img-tag to same-https origin and swap-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..9f3259468a5
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..abfd4e5a022
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..71546d2db87
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..da0fa8bf260
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..38dade49ba3
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..da70e9cc9bd
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..01b669910d2
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..eeacd36ea1d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..9f3259468a5
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..abfd4e5a022
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..0d9c9ff0afa
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.keep-origin.http.html]
+ [Referrer Policy: Expects origin for fetch to cross-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..3d593d8b0b9
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.no-redirect.http.html]
+ [Referrer Policy: Expects origin for fetch to cross-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..79eae6e3b9d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-http.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.swap-origin.http.html]
+ [Referrer Policy: Expects origin for fetch to cross-http origin and swap-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..2911a9e60a5
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-https.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.keep-origin.http.html]
+ [Referrer Policy: Expects origin for fetch to cross-https origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..5ea4a082de3
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-https.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.no-redirect.http.html]
+ [Referrer Policy: Expects origin for fetch to cross-https origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..280a8921247
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-https.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.swap-origin.http.html]
+ [Referrer Policy: Expects origin for fetch to cross-https origin and swap-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..e821f119755
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.keep-origin.http.html]
+ [Referrer Policy: Expects origin for fetch to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..d52522e6f1b
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.no-redirect.http.html]
+ [Referrer Policy: Expects origin for fetch to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..9abdc225d4a
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-http.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.swap-origin.http.html]
+ [Referrer Policy: Expects origin for fetch to same-http origin and swap-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..d204df6ff1e
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-https.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.keep-origin.http.html]
+ [Referrer Policy: Expects origin for fetch to same-https origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..837ba368f4d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-https.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.no-redirect.http.html]
+ [Referrer Policy: Expects origin for fetch to same-https origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..0c4227c0aff
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-https.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.swap-origin.http.html]
+ [Referrer Policy: Expects origin for fetch to same-https origin and swap-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..358acfa9e3d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.keep-origin.http.html]
+ [Referrer Policy: Expects origin for img-tag to cross-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..88098c53a70
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.no-redirect.http.html]
+ [Referrer Policy: Expects origin for img-tag to cross-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..fdc78287b2f
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-http.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.swap-origin.http.html]
+ [Referrer Policy: Expects origin for img-tag to cross-http origin and swap-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..1ef2b4acd86
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-https.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.keep-origin.http.html]
+ [Referrer Policy: Expects origin for img-tag to cross-https origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..f8a94a488bd
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-https.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.no-redirect.http.html]
+ [Referrer Policy: Expects origin for img-tag to cross-https origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..b5f9a3e23c4
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-https.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.swap-origin.http.html]
+ [Referrer Policy: Expects origin for img-tag to cross-https origin and swap-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..a51b9ca809f
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.keep-origin.http.html]
+ [Referrer Policy: Expects origin for img-tag to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..120396a21dc
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.no-redirect.http.html]
+ [Referrer Policy: Expects origin for img-tag to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..dc161000188
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-http.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.swap-origin.http.html]
+ [Referrer Policy: Expects origin for img-tag to same-http origin and swap-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..99de401fdb1
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-https.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.keep-origin.http.html]
+ [Referrer Policy: Expects origin for img-tag to same-https origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..5ac598c79b4
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-https.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.no-redirect.http.html]
+ [Referrer Policy: Expects origin for img-tag to same-https origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..f82362f5401
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-https.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.swap-origin.http.html]
+ [Referrer Policy: Expects origin for img-tag to same-https origin and swap-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/sharedworker-classic/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/sharedworker-classic/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..10ed4751d38
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/sharedworker-classic/same-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.keep-origin.http.html]
+ [Referrer Policy: Expects origin for sharedworker-classic to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/sharedworker-classic/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/sharedworker-classic/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..3f3d2028ec1
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/sharedworker-classic/same-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.no-redirect.http.html]
+ [Referrer Policy: Expects origin for sharedworker-classic to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/worker-classic/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/worker-classic/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..db5928d7021
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/worker-classic/same-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.keep-origin.http.html]
+ [Referrer Policy: Expects origin for worker-classic to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/worker-classic/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/worker-classic/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..b53b10f4a28
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/worker-classic/same-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.no-redirect.http.html]
+ [Referrer Policy: Expects origin for worker-classic to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/worker-module/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/worker-module/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..c332d93674e
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/worker-module/same-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.keep-origin.http.html]
+ [Referrer Policy: Expects origin for worker-module to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/worker-module/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/worker-module/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..e56c7152d59
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/worker-module/same-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.no-redirect.http.html]
+ [Referrer Policy: Expects origin for worker-module to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..3d792c4afad
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[cross-http.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..09d2d65d211
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[cross-http.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..c7e624f83f2
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html.ini
@@ -0,0 +1,13 @@
+[cross-http.swap-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and swap-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..9d2b936da93
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[cross-https.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..2baaf093e91
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[cross-https.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..6fbf1667b8d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html.ini
@@ -0,0 +1,13 @@
+[cross-https.swap-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and swap-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..37e1f75f066
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..82ffc69787e
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..017dda0f39d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.swap-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to same-http origin and swap-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..af7a0aef4c2
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-https.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to same-https origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..9db6958df9f
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[same-https.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to same-https origin and no-redirect redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..420328972f0
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-https.swap-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to same-https origin and swap-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..25a038541de
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html.ini
@@ -0,0 +1,2 @@
+[cross-http.keep-origin.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..74140791be9
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html.ini
@@ -0,0 +1,2 @@
+[cross-http.no-redirect.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..2246f24c8e5
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html.ini
@@ -0,0 +1,2 @@
+[cross-http.swap-origin.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..b1c78d9f900
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html.ini
@@ -0,0 +1,2 @@
+[cross-https.keep-origin.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..ddcac5363f5
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html.ini
@@ -0,0 +1,2 @@
+[cross-https.no-redirect.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..ccdb0672911
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html.ini
@@ -0,0 +1,2 @@
+[cross-https.swap-origin.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..2ef9bb3125d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html.ini
@@ -0,0 +1,2 @@
+[same-http.keep-origin.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..c20cd1f853f
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html.ini
@@ -0,0 +1,2 @@
+[same-http.no-redirect.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..6c30b034106
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html.ini
@@ -0,0 +1,2 @@
+[same-http.swap-origin.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..6a19cec8f34
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html.ini
@@ -0,0 +1,2 @@
+[same-https.keep-origin.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..09ce0ba8f5b
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html.ini
@@ -0,0 +1,2 @@
+[same-https.no-redirect.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..8a2333cfe1d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html.ini
@@ -0,0 +1,2 @@
+[same-https.swap-origin.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..d504364cd66
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[cross-http.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..5960a16e8a5
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[cross-http.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..ce8730853a1
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html.ini
@@ -0,0 +1,13 @@
+[cross-http.swap-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and swap-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..e4f7468d2f3
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[cross-https.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..9b13306ab27
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[cross-https.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and no-redirect redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..f7ff97ef2e1
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html.ini
@@ -0,0 +1,13 @@
+[cross-https.swap-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and swap-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..2ed4a610b1b
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..854bdaaae87
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..1566810adc6
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.swap-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and swap-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..78b04936326
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-https.keep-origin.http.html]
+ [Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..c9765708e4e
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[same-https.no-redirect.http.html]
+ [Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and no-redirect redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..696faf157ff
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-https.swap-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and swap-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..41efbaa64d7
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.keep-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..68bde792a04
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.no-redirect.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..2d7cf8eae9e
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.swap-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..5f5bde466bf
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.keep-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..697b1c45e29
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.no-redirect.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..281f2b968ea
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.swap-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..9f3259468a5
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..abfd4e5a022
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..e26de23b9f1
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.swap-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..ebdb0e600dd
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.keep-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..6e6321f5809
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.no-redirect.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..6f1817b75a0
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.swap-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..71546d2db87
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..da0fa8bf260
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..38dade49ba3
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..da70e9cc9bd
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..01b669910d2
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..eeacd36ea1d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..41efbaa64d7
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.keep-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..68bde792a04
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.no-redirect.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..2d7cf8eae9e
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.swap-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..5f5bde466bf
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.keep-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..697b1c45e29
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.no-redirect.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..281f2b968ea
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.swap-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..9f3259468a5
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..abfd4e5a022
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..e26de23b9f1
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.swap-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..ebdb0e600dd
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.keep-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..6e6321f5809
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.no-redirect.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..6f1817b75a0
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.swap-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/fetch/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/fetch/cross-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..3d792c4afad
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/fetch/cross-http.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[cross-http.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/fetch/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/fetch/cross-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..09d2d65d211
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/fetch/cross-http.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[cross-http.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/fetch/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/fetch/cross-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..c7e624f83f2
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/fetch/cross-http.swap-origin.http.html.ini
@@ -0,0 +1,13 @@
+[cross-http.swap-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and swap-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/fetch/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/fetch/cross-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..9d2b936da93
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/fetch/cross-https.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[cross-https.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/fetch/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/fetch/cross-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..2baaf093e91
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/fetch/cross-https.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[cross-https.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/fetch/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/fetch/cross-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..6fbf1667b8d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/fetch/cross-https.swap-origin.http.html.ini
@@ -0,0 +1,13 @@
+[cross-https.swap-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and swap-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/fetch/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/fetch/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..37e1f75f066
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/fetch/same-http.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/fetch/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/fetch/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..82ffc69787e
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/fetch/same-http.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/fetch/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/fetch/same-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..017dda0f39d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/fetch/same-http.swap-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.swap-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to same-http origin and swap-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/fetch/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/fetch/same-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..af7a0aef4c2
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/fetch/same-https.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-https.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to same-https origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/fetch/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/fetch/same-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..9db6958df9f
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/fetch/same-https.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[same-https.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to same-https origin and no-redirect redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/fetch/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/fetch/same-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..420328972f0
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/fetch/same-https.swap-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-https.swap-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to same-https origin and swap-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/iframe-tag/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/iframe-tag/cross-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..25a038541de
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/iframe-tag/cross-http.keep-origin.http.html.ini
@@ -0,0 +1,2 @@
+[cross-http.keep-origin.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/iframe-tag/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/iframe-tag/cross-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..74140791be9
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/iframe-tag/cross-http.no-redirect.http.html.ini
@@ -0,0 +1,2 @@
+[cross-http.no-redirect.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/iframe-tag/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/iframe-tag/cross-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..2246f24c8e5
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/iframe-tag/cross-http.swap-origin.http.html.ini
@@ -0,0 +1,2 @@
+[cross-http.swap-origin.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/iframe-tag/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/iframe-tag/cross-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..b1c78d9f900
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/iframe-tag/cross-https.keep-origin.http.html.ini
@@ -0,0 +1,2 @@
+[cross-https.keep-origin.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/iframe-tag/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/iframe-tag/cross-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..ddcac5363f5
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/iframe-tag/cross-https.no-redirect.http.html.ini
@@ -0,0 +1,2 @@
+[cross-https.no-redirect.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/iframe-tag/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/iframe-tag/cross-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..ccdb0672911
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/iframe-tag/cross-https.swap-origin.http.html.ini
@@ -0,0 +1,2 @@
+[cross-https.swap-origin.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/iframe-tag/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/iframe-tag/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..2ef9bb3125d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/iframe-tag/same-http.keep-origin.http.html.ini
@@ -0,0 +1,2 @@
+[same-http.keep-origin.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/iframe-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/iframe-tag/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..c20cd1f853f
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/iframe-tag/same-http.no-redirect.http.html.ini
@@ -0,0 +1,2 @@
+[same-http.no-redirect.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/iframe-tag/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/iframe-tag/same-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..6c30b034106
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/iframe-tag/same-http.swap-origin.http.html.ini
@@ -0,0 +1,2 @@
+[same-http.swap-origin.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/iframe-tag/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/iframe-tag/same-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..6a19cec8f34
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/iframe-tag/same-https.keep-origin.http.html.ini
@@ -0,0 +1,2 @@
+[same-https.keep-origin.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/iframe-tag/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/iframe-tag/same-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..09ce0ba8f5b
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/iframe-tag/same-https.no-redirect.http.html.ini
@@ -0,0 +1,2 @@
+[same-https.no-redirect.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/iframe-tag/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/iframe-tag/same-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..8a2333cfe1d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/iframe-tag/same-https.swap-origin.http.html.ini
@@ -0,0 +1,2 @@
+[same-https.swap-origin.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/img-tag/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/img-tag/cross-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..d504364cd66
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/img-tag/cross-http.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[cross-http.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/img-tag/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/img-tag/cross-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..5960a16e8a5
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/img-tag/cross-http.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[cross-http.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/img-tag/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/img-tag/cross-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..ce8730853a1
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/img-tag/cross-http.swap-origin.http.html.ini
@@ -0,0 +1,13 @@
+[cross-http.swap-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and swap-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/img-tag/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/img-tag/cross-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..e4f7468d2f3
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/img-tag/cross-https.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[cross-https.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/img-tag/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/img-tag/cross-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..9b13306ab27
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/img-tag/cross-https.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[cross-https.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and no-redirect redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/img-tag/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/img-tag/cross-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..f7ff97ef2e1
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/img-tag/cross-https.swap-origin.http.html.ini
@@ -0,0 +1,13 @@
+[cross-https.swap-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and swap-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/img-tag/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/img-tag/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..2ed4a610b1b
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/img-tag/same-http.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/img-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/img-tag/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..854bdaaae87
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/img-tag/same-http.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/img-tag/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/img-tag/same-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..1566810adc6
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/img-tag/same-http.swap-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.swap-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and swap-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/img-tag/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/img-tag/same-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..78b04936326
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/img-tag/same-https.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-https.keep-origin.http.html]
+ [Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/img-tag/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/img-tag/same-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..c9765708e4e
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/img-tag/same-https.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[same-https.no-redirect.http.html]
+ [Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and no-redirect redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/img-tag/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/img-tag/same-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..696faf157ff
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/img-tag/same-https.swap-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-https.swap-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and swap-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/script-tag/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/script-tag/cross-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..41efbaa64d7
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/script-tag/cross-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.keep-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/script-tag/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/script-tag/cross-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..68bde792a04
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/script-tag/cross-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.no-redirect.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/script-tag/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/script-tag/cross-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..2d7cf8eae9e
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/script-tag/cross-http.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.swap-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/script-tag/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/script-tag/cross-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..5f5bde466bf
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/script-tag/cross-https.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.keep-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/script-tag/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/script-tag/cross-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..697b1c45e29
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/script-tag/cross-https.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.no-redirect.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/script-tag/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/script-tag/cross-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..281f2b968ea
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/script-tag/cross-https.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.swap-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/script-tag/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/script-tag/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..9f3259468a5
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/script-tag/same-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/script-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/script-tag/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..abfd4e5a022
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/script-tag/same-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/script-tag/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/script-tag/same-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..e26de23b9f1
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/script-tag/same-http.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.swap-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/script-tag/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/script-tag/same-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..ebdb0e600dd
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/script-tag/same-https.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.keep-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/script-tag/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/script-tag/same-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..6e6321f5809
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/script-tag/same-https.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.no-redirect.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/script-tag/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/script-tag/same-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..6f1817b75a0
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/script-tag/same-https.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.swap-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/sharedworker-classic/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/sharedworker-classic/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..71546d2db87
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/sharedworker-classic/same-http.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/sharedworker-classic/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/sharedworker-classic/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..da0fa8bf260
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/sharedworker-classic/same-http.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/worker-classic/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/worker-classic/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..38dade49ba3
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/worker-classic/same-http.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/worker-classic/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/worker-classic/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..da70e9cc9bd
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/worker-classic/same-http.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/worker-module/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/worker-module/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..01b669910d2
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/worker-module/same-http.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/worker-module/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/worker-module/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..eeacd36ea1d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/worker-module/same-http.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/xhr/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/xhr/cross-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..41efbaa64d7
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/xhr/cross-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.keep-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/xhr/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/xhr/cross-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..68bde792a04
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/xhr/cross-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.no-redirect.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/xhr/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/xhr/cross-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..2d7cf8eae9e
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/xhr/cross-http.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.swap-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/xhr/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/xhr/cross-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..5f5bde466bf
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/xhr/cross-https.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.keep-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/xhr/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/xhr/cross-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..697b1c45e29
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/xhr/cross-https.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.no-redirect.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/xhr/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/xhr/cross-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..281f2b968ea
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/xhr/cross-https.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.swap-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/xhr/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/xhr/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..9f3259468a5
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/xhr/same-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/xhr/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/xhr/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..abfd4e5a022
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/xhr/same-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/xhr/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/xhr/same-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..e26de23b9f1
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/xhr/same-http.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.swap-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/xhr/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/xhr/same-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..ebdb0e600dd
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/xhr/same-https.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.keep-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/xhr/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/xhr/same-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..6e6321f5809
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/xhr/same-https.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.no-redirect.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/xhr/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/xhr/same-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..6f1817b75a0
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/xhr/same-https.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.swap-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..3d792c4afad
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[cross-http.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..09d2d65d211
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[cross-http.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..c7e624f83f2
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html.ini
@@ -0,0 +1,13 @@
+[cross-http.swap-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and swap-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..9d2b936da93
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[cross-https.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..2baaf093e91
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[cross-https.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..6fbf1667b8d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html.ini
@@ -0,0 +1,13 @@
+[cross-https.swap-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and swap-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..37e1f75f066
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..82ffc69787e
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..017dda0f39d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.swap-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to same-http origin and swap-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..af7a0aef4c2
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-https.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to same-https origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..9db6958df9f
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[same-https.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to same-https origin and no-redirect redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..420328972f0
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-https.swap-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to same-https origin and swap-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..25a038541de
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html.ini
@@ -0,0 +1,2 @@
+[cross-http.keep-origin.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..74140791be9
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html.ini
@@ -0,0 +1,2 @@
+[cross-http.no-redirect.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..2246f24c8e5
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html.ini
@@ -0,0 +1,2 @@
+[cross-http.swap-origin.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..b1c78d9f900
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html.ini
@@ -0,0 +1,2 @@
+[cross-https.keep-origin.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..ddcac5363f5
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html.ini
@@ -0,0 +1,2 @@
+[cross-https.no-redirect.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..ccdb0672911
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html.ini
@@ -0,0 +1,2 @@
+[cross-https.swap-origin.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..2ef9bb3125d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html.ini
@@ -0,0 +1,2 @@
+[same-http.keep-origin.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..c20cd1f853f
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html.ini
@@ -0,0 +1,2 @@
+[same-http.no-redirect.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..6c30b034106
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html.ini
@@ -0,0 +1,2 @@
+[same-http.swap-origin.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..6a19cec8f34
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html.ini
@@ -0,0 +1,2 @@
+[same-https.keep-origin.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..09ce0ba8f5b
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html.ini
@@ -0,0 +1,2 @@
+[same-https.no-redirect.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..8a2333cfe1d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html.ini
@@ -0,0 +1,2 @@
+[same-https.swap-origin.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..41efbaa64d7
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.keep-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..68bde792a04
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.no-redirect.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..2d7cf8eae9e
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.swap-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..5f5bde466bf
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.keep-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..697b1c45e29
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.no-redirect.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..281f2b968ea
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.swap-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..9f3259468a5
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..abfd4e5a022
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..e26de23b9f1
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.swap-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..ebdb0e600dd
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.keep-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..6e6321f5809
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.no-redirect.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..6f1817b75a0
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.swap-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..71546d2db87
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..da0fa8bf260
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..38dade49ba3
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..da70e9cc9bd
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..01b669910d2
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..eeacd36ea1d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..41efbaa64d7
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.keep-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..68bde792a04
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.no-redirect.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..2d7cf8eae9e
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.swap-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..5f5bde466bf
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.keep-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..697b1c45e29
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.no-redirect.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..281f2b968ea
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.swap-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..9f3259468a5
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..abfd4e5a022
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..e26de23b9f1
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.swap-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..ebdb0e600dd
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.keep-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..6e6321f5809
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.no-redirect.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..6f1817b75a0
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.swap-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer/sharedworker-classic/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer/sharedworker-classic/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..1769b2580b4
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer/sharedworker-classic/same-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.keep-origin.http.html]
+ [Referrer Policy: Expects omitted for sharedworker-classic to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer/sharedworker-classic/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer/sharedworker-classic/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..e529a4801cd
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer/sharedworker-classic/same-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.no-redirect.http.html]
+ [Referrer Policy: Expects omitted for sharedworker-classic to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..0d9c9ff0afa
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.keep-origin.http.html]
+ [Referrer Policy: Expects origin for fetch to cross-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..3d593d8b0b9
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.no-redirect.http.html]
+ [Referrer Policy: Expects origin for fetch to cross-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..79eae6e3b9d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.swap-origin.http.html]
+ [Referrer Policy: Expects origin for fetch to cross-http origin and swap-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..2911a9e60a5
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.keep-origin.http.html]
+ [Referrer Policy: Expects origin for fetch to cross-https origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..5ea4a082de3
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.no-redirect.http.html]
+ [Referrer Policy: Expects origin for fetch to cross-https origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..280a8921247
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.swap-origin.http.html]
+ [Referrer Policy: Expects origin for fetch to cross-https origin and swap-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..37e1f75f066
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/same-http.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..82ffc69787e
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/same-http.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/same-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..9abdc225d4a
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/same-http.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.swap-origin.http.html]
+ [Referrer Policy: Expects origin for fetch to same-http origin and swap-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/same-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..d204df6ff1e
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/same-https.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.keep-origin.http.html]
+ [Referrer Policy: Expects origin for fetch to same-https origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/same-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..837ba368f4d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/same-https.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.no-redirect.http.html]
+ [Referrer Policy: Expects origin for fetch to same-https origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/same-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..0c4227c0aff
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/same-https.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.swap-origin.http.html]
+ [Referrer Policy: Expects origin for fetch to same-https origin and swap-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..2ef9bb3125d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.ini
@@ -0,0 +1,2 @@
+[same-http.keep-origin.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..c20cd1f853f
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.ini
@@ -0,0 +1,2 @@
+[same-http.no-redirect.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..9f3259468a5
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..abfd4e5a022
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..71546d2db87
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..da0fa8bf260
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..38dade49ba3
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..da70e9cc9bd
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..01b669910d2
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..eeacd36ea1d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..9f3259468a5
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/same-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..abfd4e5a022
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/same-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/origin/fetch/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin/fetch/cross-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..0d9c9ff0afa
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin/fetch/cross-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.keep-origin.http.html]
+ [Referrer Policy: Expects origin for fetch to cross-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/origin/fetch/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin/fetch/cross-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..3d593d8b0b9
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin/fetch/cross-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.no-redirect.http.html]
+ [Referrer Policy: Expects origin for fetch to cross-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/origin/fetch/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin/fetch/cross-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..79eae6e3b9d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin/fetch/cross-http.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.swap-origin.http.html]
+ [Referrer Policy: Expects origin for fetch to cross-http origin and swap-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/origin/fetch/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin/fetch/cross-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..2911a9e60a5
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin/fetch/cross-https.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.keep-origin.http.html]
+ [Referrer Policy: Expects origin for fetch to cross-https origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/origin/fetch/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin/fetch/cross-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..5ea4a082de3
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin/fetch/cross-https.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.no-redirect.http.html]
+ [Referrer Policy: Expects origin for fetch to cross-https origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/origin/fetch/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin/fetch/cross-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..280a8921247
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin/fetch/cross-https.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.swap-origin.http.html]
+ [Referrer Policy: Expects origin for fetch to cross-https origin and swap-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/origin/fetch/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin/fetch/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..e821f119755
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin/fetch/same-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.keep-origin.http.html]
+ [Referrer Policy: Expects origin for fetch to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/origin/fetch/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin/fetch/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..d52522e6f1b
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin/fetch/same-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.no-redirect.http.html]
+ [Referrer Policy: Expects origin for fetch to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/origin/fetch/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin/fetch/same-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..9abdc225d4a
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin/fetch/same-http.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.swap-origin.http.html]
+ [Referrer Policy: Expects origin for fetch to same-http origin and swap-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/origin/fetch/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin/fetch/same-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..d204df6ff1e
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin/fetch/same-https.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.keep-origin.http.html]
+ [Referrer Policy: Expects origin for fetch to same-https origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/origin/fetch/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin/fetch/same-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..837ba368f4d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin/fetch/same-https.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.no-redirect.http.html]
+ [Referrer Policy: Expects origin for fetch to same-https origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/origin/fetch/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin/fetch/same-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..0c4227c0aff
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin/fetch/same-https.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.swap-origin.http.html]
+ [Referrer Policy: Expects origin for fetch to same-https origin and swap-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/origin/sharedworker-classic/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin/sharedworker-classic/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..10ed4751d38
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin/sharedworker-classic/same-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.keep-origin.http.html]
+ [Referrer Policy: Expects origin for sharedworker-classic to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/origin/sharedworker-classic/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin/sharedworker-classic/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..3f3d2028ec1
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin/sharedworker-classic/same-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.no-redirect.http.html]
+ [Referrer Policy: Expects origin for sharedworker-classic to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/origin/worker-classic/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin/worker-classic/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..db5928d7021
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin/worker-classic/same-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.keep-origin.http.html]
+ [Referrer Policy: Expects origin for worker-classic to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/origin/worker-classic/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin/worker-classic/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..b53b10f4a28
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin/worker-classic/same-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.no-redirect.http.html]
+ [Referrer Policy: Expects origin for worker-classic to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/origin/worker-module/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin/worker-module/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..c332d93674e
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin/worker-module/same-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.keep-origin.http.html]
+ [Referrer Policy: Expects origin for worker-module to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/origin/worker-module/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin/worker-module/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..e56c7152d59
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin/worker-module/same-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.no-redirect.http.html]
+ [Referrer Policy: Expects origin for worker-module to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/same-origin/fetch/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/same-origin/fetch/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..37e1f75f066
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/same-origin/fetch/same-http.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/same-origin/fetch/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/same-origin/fetch/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..82ffc69787e
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/same-origin/fetch/same-http.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/same-origin/iframe-tag/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/same-origin/iframe-tag/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..2ef9bb3125d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/same-origin/iframe-tag/same-http.keep-origin.http.html.ini
@@ -0,0 +1,2 @@
+[same-http.keep-origin.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/same-origin/iframe-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/same-origin/iframe-tag/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..c20cd1f853f
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/same-origin/iframe-tag/same-http.no-redirect.http.html.ini
@@ -0,0 +1,2 @@
+[same-http.no-redirect.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/same-origin/script-tag/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/same-origin/script-tag/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..9f3259468a5
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/same-origin/script-tag/same-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/same-origin/script-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/same-origin/script-tag/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..abfd4e5a022
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/same-origin/script-tag/same-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/same-origin/sharedworker-classic/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/same-origin/sharedworker-classic/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..71546d2db87
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/same-origin/sharedworker-classic/same-http.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/same-origin/sharedworker-classic/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/same-origin/sharedworker-classic/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..da0fa8bf260
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/same-origin/sharedworker-classic/same-http.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/same-origin/worker-classic/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/same-origin/worker-classic/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..38dade49ba3
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/same-origin/worker-classic/same-http.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/same-origin/worker-classic/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/same-origin/worker-classic/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..da70e9cc9bd
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/same-origin/worker-classic/same-http.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/same-origin/worker-module/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/same-origin/worker-module/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..01b669910d2
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/same-origin/worker-module/same-http.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/same-origin/worker-module/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/same-origin/worker-module/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..eeacd36ea1d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/same-origin/worker-module/same-http.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/same-origin/xhr/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/same-origin/xhr/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..9f3259468a5
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/same-origin/xhr/same-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/same-origin/xhr/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/same-origin/xhr/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..abfd4e5a022
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/same-origin/xhr/same-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..0d9c9ff0afa
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.keep-origin.http.html]
+ [Referrer Policy: Expects origin for fetch to cross-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..3d593d8b0b9
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.no-redirect.http.html]
+ [Referrer Policy: Expects origin for fetch to cross-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..79eae6e3b9d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.swap-origin.http.html]
+ [Referrer Policy: Expects origin for fetch to cross-http origin and swap-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..2911a9e60a5
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.keep-origin.http.html]
+ [Referrer Policy: Expects origin for fetch to cross-https origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..5ea4a082de3
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.no-redirect.http.html]
+ [Referrer Policy: Expects origin for fetch to cross-https origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..280a8921247
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.swap-origin.http.html]
+ [Referrer Policy: Expects origin for fetch to cross-https origin and swap-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..37e1f75f066
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..82ffc69787e
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..9abdc225d4a
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.swap-origin.http.html]
+ [Referrer Policy: Expects origin for fetch to same-http origin and swap-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..d204df6ff1e
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.keep-origin.http.html]
+ [Referrer Policy: Expects origin for fetch to same-https origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..837ba368f4d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.no-redirect.http.html]
+ [Referrer Policy: Expects origin for fetch to same-https origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..0c4227c0aff
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.swap-origin.http.html]
+ [Referrer Policy: Expects origin for fetch to same-https origin and swap-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..2ef9bb3125d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.ini
@@ -0,0 +1,2 @@
+[same-http.keep-origin.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..c20cd1f853f
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.ini
@@ -0,0 +1,2 @@
+[same-http.no-redirect.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..9f3259468a5
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..abfd4e5a022
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..71546d2db87
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..da0fa8bf260
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..38dade49ba3
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..da70e9cc9bd
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..01b669910d2
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..eeacd36ea1d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..9f3259468a5
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..abfd4e5a022
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/fetch/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/fetch/cross-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..0d9c9ff0afa
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/fetch/cross-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.keep-origin.http.html]
+ [Referrer Policy: Expects origin for fetch to cross-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/fetch/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/fetch/cross-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..3d593d8b0b9
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/fetch/cross-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.no-redirect.http.html]
+ [Referrer Policy: Expects origin for fetch to cross-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/fetch/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/fetch/cross-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..79eae6e3b9d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/fetch/cross-http.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.swap-origin.http.html]
+ [Referrer Policy: Expects origin for fetch to cross-http origin and swap-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/fetch/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/fetch/cross-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..2911a9e60a5
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/fetch/cross-https.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.keep-origin.http.html]
+ [Referrer Policy: Expects origin for fetch to cross-https origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/fetch/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/fetch/cross-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..5ea4a082de3
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/fetch/cross-https.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.no-redirect.http.html]
+ [Referrer Policy: Expects origin for fetch to cross-https origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/fetch/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/fetch/cross-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..280a8921247
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/fetch/cross-https.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.swap-origin.http.html]
+ [Referrer Policy: Expects origin for fetch to cross-https origin and swap-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/fetch/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/fetch/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..e821f119755
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/fetch/same-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.keep-origin.http.html]
+ [Referrer Policy: Expects origin for fetch to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/fetch/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/fetch/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..d52522e6f1b
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/fetch/same-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.no-redirect.http.html]
+ [Referrer Policy: Expects origin for fetch to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/fetch/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/fetch/same-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..9abdc225d4a
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/fetch/same-http.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.swap-origin.http.html]
+ [Referrer Policy: Expects origin for fetch to same-http origin and swap-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/fetch/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/fetch/same-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..d204df6ff1e
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/fetch/same-https.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.keep-origin.http.html]
+ [Referrer Policy: Expects origin for fetch to same-https origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/fetch/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/fetch/same-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..837ba368f4d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/fetch/same-https.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.no-redirect.http.html]
+ [Referrer Policy: Expects origin for fetch to same-https origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/fetch/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/fetch/same-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..0c4227c0aff
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/fetch/same-https.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.swap-origin.http.html]
+ [Referrer Policy: Expects origin for fetch to same-https origin and swap-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/sharedworker-classic/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/sharedworker-classic/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..10ed4751d38
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/sharedworker-classic/same-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.keep-origin.http.html]
+ [Referrer Policy: Expects origin for sharedworker-classic to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/sharedworker-classic/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/sharedworker-classic/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..3f3d2028ec1
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/sharedworker-classic/same-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.no-redirect.http.html]
+ [Referrer Policy: Expects origin for sharedworker-classic to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/worker-classic/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/worker-classic/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..db5928d7021
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/worker-classic/same-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.keep-origin.http.html]
+ [Referrer Policy: Expects origin for worker-classic to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/worker-classic/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/worker-classic/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..b53b10f4a28
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/worker-classic/same-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.no-redirect.http.html]
+ [Referrer Policy: Expects origin for worker-classic to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/worker-module/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/worker-module/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..c332d93674e
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/worker-module/same-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.keep-origin.http.html]
+ [Referrer Policy: Expects origin for worker-module to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/worker-module/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/worker-module/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..e56c7152d59
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/worker-module/same-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.no-redirect.http.html]
+ [Referrer Policy: Expects origin for worker-module to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/fetch/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/fetch/cross-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..3d792c4afad
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/fetch/cross-http.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[cross-http.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/fetch/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/fetch/cross-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..09d2d65d211
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/fetch/cross-http.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[cross-http.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/fetch/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/fetch/cross-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..c7e624f83f2
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/fetch/cross-http.swap-origin.http.html.ini
@@ -0,0 +1,13 @@
+[cross-http.swap-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and swap-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/fetch/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/fetch/cross-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..9d2b936da93
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/fetch/cross-https.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[cross-https.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/fetch/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/fetch/cross-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..2baaf093e91
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/fetch/cross-https.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[cross-https.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/fetch/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/fetch/cross-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..6fbf1667b8d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/fetch/cross-https.swap-origin.http.html.ini
@@ -0,0 +1,13 @@
+[cross-https.swap-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and swap-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/fetch/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/fetch/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..37e1f75f066
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/fetch/same-http.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/fetch/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/fetch/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..82ffc69787e
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/fetch/same-http.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/fetch/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/fetch/same-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..017dda0f39d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/fetch/same-http.swap-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.swap-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to same-http origin and swap-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/fetch/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/fetch/same-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..af7a0aef4c2
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/fetch/same-https.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-https.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to same-https origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/fetch/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/fetch/same-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..9db6958df9f
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/fetch/same-https.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[same-https.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to same-https origin and no-redirect redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/fetch/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/fetch/same-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..420328972f0
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/fetch/same-https.swap-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-https.swap-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to same-https origin and swap-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/cross-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..25a038541de
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/cross-http.keep-origin.http.html.ini
@@ -0,0 +1,2 @@
+[cross-http.keep-origin.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/cross-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..74140791be9
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/cross-http.no-redirect.http.html.ini
@@ -0,0 +1,2 @@
+[cross-http.no-redirect.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/cross-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..2246f24c8e5
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/cross-http.swap-origin.http.html.ini
@@ -0,0 +1,2 @@
+[cross-http.swap-origin.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/cross-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..b1c78d9f900
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/cross-https.keep-origin.http.html.ini
@@ -0,0 +1,2 @@
+[cross-https.keep-origin.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/cross-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..ddcac5363f5
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/cross-https.no-redirect.http.html.ini
@@ -0,0 +1,2 @@
+[cross-https.no-redirect.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/cross-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..ccdb0672911
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/cross-https.swap-origin.http.html.ini
@@ -0,0 +1,2 @@
+[cross-https.swap-origin.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..2ef9bb3125d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/same-http.keep-origin.http.html.ini
@@ -0,0 +1,2 @@
+[same-http.keep-origin.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..c20cd1f853f
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/same-http.no-redirect.http.html.ini
@@ -0,0 +1,2 @@
+[same-http.no-redirect.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/same-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..6c30b034106
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/same-http.swap-origin.http.html.ini
@@ -0,0 +1,2 @@
+[same-http.swap-origin.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/same-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..6a19cec8f34
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/same-https.keep-origin.http.html.ini
@@ -0,0 +1,2 @@
+[same-https.keep-origin.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/same-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..09ce0ba8f5b
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/same-https.no-redirect.http.html.ini
@@ -0,0 +1,2 @@
+[same-https.no-redirect.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/same-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..8a2333cfe1d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/same-https.swap-origin.http.html.ini
@@ -0,0 +1,2 @@
+[same-https.swap-origin.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/script-tag/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/script-tag/cross-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..41efbaa64d7
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/script-tag/cross-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.keep-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/script-tag/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/script-tag/cross-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..68bde792a04
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/script-tag/cross-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.no-redirect.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/script-tag/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/script-tag/cross-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..2d7cf8eae9e
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/script-tag/cross-http.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.swap-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/script-tag/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/script-tag/cross-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..5f5bde466bf
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/script-tag/cross-https.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.keep-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/script-tag/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/script-tag/cross-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..697b1c45e29
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/script-tag/cross-https.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.no-redirect.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/script-tag/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/script-tag/cross-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..281f2b968ea
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/script-tag/cross-https.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.swap-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/script-tag/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/script-tag/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..9f3259468a5
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/script-tag/same-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/script-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/script-tag/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..abfd4e5a022
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/script-tag/same-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/script-tag/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/script-tag/same-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..e26de23b9f1
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/script-tag/same-http.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.swap-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/script-tag/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/script-tag/same-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..ebdb0e600dd
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/script-tag/same-https.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.keep-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/script-tag/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/script-tag/same-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..6e6321f5809
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/script-tag/same-https.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.no-redirect.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/script-tag/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/script-tag/same-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..6f1817b75a0
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/script-tag/same-https.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.swap-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..71546d2db87
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..da0fa8bf260
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/worker-classic/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/worker-classic/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..38dade49ba3
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/worker-classic/same-http.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/worker-classic/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/worker-classic/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..da70e9cc9bd
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/worker-classic/same-http.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/worker-module/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/worker-module/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..01b669910d2
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/worker-module/same-http.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/worker-module/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/worker-module/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..eeacd36ea1d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/worker-module/same-http.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/xhr/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/xhr/cross-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..41efbaa64d7
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/xhr/cross-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.keep-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/xhr/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/xhr/cross-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..68bde792a04
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/xhr/cross-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.no-redirect.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/xhr/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/xhr/cross-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..2d7cf8eae9e
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/xhr/cross-http.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.swap-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/xhr/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/xhr/cross-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..5f5bde466bf
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/xhr/cross-https.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.keep-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/xhr/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/xhr/cross-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..697b1c45e29
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/xhr/cross-https.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.no-redirect.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/xhr/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/xhr/cross-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..281f2b968ea
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/xhr/cross-https.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.swap-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/xhr/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/xhr/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..9f3259468a5
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/xhr/same-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/xhr/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/xhr/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..abfd4e5a022
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/xhr/same-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/xhr/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/xhr/same-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..e26de23b9f1
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/xhr/same-http.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.swap-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/xhr/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/xhr/same-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..ebdb0e600dd
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/xhr/same-https.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.keep-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/xhr/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/xhr/same-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..6e6321f5809
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/xhr/same-https.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.no-redirect.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/xhr/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/xhr/same-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..6f1817b75a0
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/xhr/same-https.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.swap-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/fetch/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/fetch/cross-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..3d792c4afad
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/fetch/cross-http.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[cross-http.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/fetch/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/fetch/cross-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..09d2d65d211
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/fetch/cross-http.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[cross-http.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/fetch/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/fetch/cross-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..c7e624f83f2
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/fetch/cross-http.swap-origin.http.html.ini
@@ -0,0 +1,13 @@
+[cross-http.swap-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and swap-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/fetch/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/fetch/cross-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..9d2b936da93
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/fetch/cross-https.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[cross-https.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and keep-origin redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/fetch/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/fetch/cross-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..2baaf093e91
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/fetch/cross-https.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[cross-https.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/fetch/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/fetch/cross-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..6fbf1667b8d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/fetch/cross-https.swap-origin.http.html.ini
@@ -0,0 +1,13 @@
+[cross-https.swap-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and swap-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/fetch/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/fetch/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..37e1f75f066
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/fetch/same-http.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/fetch/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/fetch/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..82ffc69787e
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/fetch/same-http.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/fetch/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/fetch/same-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..017dda0f39d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/fetch/same-http.swap-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.swap-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to same-http origin and swap-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/fetch/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/fetch/same-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..af7a0aef4c2
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/fetch/same-https.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-https.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to same-https origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/fetch/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/fetch/same-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..9db6958df9f
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/fetch/same-https.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[same-https.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to same-https origin and no-redirect redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/fetch/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/fetch/same-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..420328972f0
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/fetch/same-https.swap-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-https.swap-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for fetch to same-https origin and swap-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/iframe-tag/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/iframe-tag/cross-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..25a038541de
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/iframe-tag/cross-http.keep-origin.http.html.ini
@@ -0,0 +1,2 @@
+[cross-http.keep-origin.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/iframe-tag/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/iframe-tag/cross-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..74140791be9
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/iframe-tag/cross-http.no-redirect.http.html.ini
@@ -0,0 +1,2 @@
+[cross-http.no-redirect.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/iframe-tag/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/iframe-tag/cross-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..2246f24c8e5
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/iframe-tag/cross-http.swap-origin.http.html.ini
@@ -0,0 +1,2 @@
+[cross-http.swap-origin.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/iframe-tag/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/iframe-tag/cross-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..b1c78d9f900
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/iframe-tag/cross-https.keep-origin.http.html.ini
@@ -0,0 +1,2 @@
+[cross-https.keep-origin.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/iframe-tag/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/iframe-tag/cross-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..ddcac5363f5
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/iframe-tag/cross-https.no-redirect.http.html.ini
@@ -0,0 +1,2 @@
+[cross-https.no-redirect.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/iframe-tag/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/iframe-tag/cross-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..ccdb0672911
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/iframe-tag/cross-https.swap-origin.http.html.ini
@@ -0,0 +1,2 @@
+[cross-https.swap-origin.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/iframe-tag/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/iframe-tag/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..2ef9bb3125d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/iframe-tag/same-http.keep-origin.http.html.ini
@@ -0,0 +1,2 @@
+[same-http.keep-origin.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/iframe-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/iframe-tag/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..c20cd1f853f
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/iframe-tag/same-http.no-redirect.http.html.ini
@@ -0,0 +1,2 @@
+[same-http.no-redirect.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/iframe-tag/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/iframe-tag/same-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..6c30b034106
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/iframe-tag/same-http.swap-origin.http.html.ini
@@ -0,0 +1,2 @@
+[same-http.swap-origin.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/iframe-tag/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/iframe-tag/same-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..6a19cec8f34
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/iframe-tag/same-https.keep-origin.http.html.ini
@@ -0,0 +1,2 @@
+[same-https.keep-origin.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/iframe-tag/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/iframe-tag/same-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..09ce0ba8f5b
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/iframe-tag/same-https.no-redirect.http.html.ini
@@ -0,0 +1,2 @@
+[same-https.no-redirect.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/iframe-tag/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/iframe-tag/same-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..8a2333cfe1d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/iframe-tag/same-https.swap-origin.http.html.ini
@@ -0,0 +1,2 @@
+[same-https.swap-origin.http.html]
+ expected: CRASH
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/script-tag/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/script-tag/cross-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..41efbaa64d7
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/script-tag/cross-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.keep-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/script-tag/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/script-tag/cross-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..68bde792a04
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/script-tag/cross-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.no-redirect.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/script-tag/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/script-tag/cross-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..2d7cf8eae9e
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/script-tag/cross-http.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.swap-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/script-tag/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/script-tag/cross-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..5f5bde466bf
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/script-tag/cross-https.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.keep-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/script-tag/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/script-tag/cross-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..697b1c45e29
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/script-tag/cross-https.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.no-redirect.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/script-tag/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/script-tag/cross-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..281f2b968ea
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/script-tag/cross-https.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.swap-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/script-tag/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/script-tag/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..9f3259468a5
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/script-tag/same-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/script-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/script-tag/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..abfd4e5a022
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/script-tag/same-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/script-tag/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/script-tag/same-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..e26de23b9f1
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/script-tag/same-http.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.swap-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/script-tag/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/script-tag/same-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..ebdb0e600dd
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/script-tag/same-https.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.keep-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/script-tag/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/script-tag/same-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..6e6321f5809
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/script-tag/same-https.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.no-redirect.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/script-tag/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/script-tag/same-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..6f1817b75a0
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/script-tag/same-https.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.swap-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/sharedworker-classic/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/sharedworker-classic/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..71546d2db87
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/sharedworker-classic/same-http.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/sharedworker-classic/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/sharedworker-classic/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..da0fa8bf260
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/sharedworker-classic/same-http.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/worker-classic/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/worker-classic/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..38dade49ba3
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/worker-classic/same-http.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/worker-classic/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/worker-classic/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..da70e9cc9bd
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/worker-classic/same-http.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/worker-module/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/worker-module/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..01b669910d2
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/worker-module/same-http.keep-origin.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/worker-module/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/worker-module/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..eeacd36ea1d
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/worker-module/same-http.no-redirect.http.html.ini
@@ -0,0 +1,13 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length < 4k is not stripped to an origin.]
+ expected: FAIL
+
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
+ [Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context.]
+ expected: FAIL
+
+ [`Referer` header with length == 4k is not stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/xhr/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/xhr/cross-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..41efbaa64d7
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/xhr/cross-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.keep-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/xhr/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/xhr/cross-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..68bde792a04
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/xhr/cross-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.no-redirect.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/xhr/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/xhr/cross-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..2d7cf8eae9e
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/xhr/cross-http.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-http.swap-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/xhr/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/xhr/cross-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..5f5bde466bf
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/xhr/cross-https.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.keep-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/xhr/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/xhr/cross-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..697b1c45e29
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/xhr/cross-https.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.no-redirect.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/xhr/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/xhr/cross-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..281f2b968ea
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/xhr/cross-https.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[cross-https.swap-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/xhr/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/xhr/same-http.keep-origin.http.html.ini
new file mode 100644
index 00000000000..9f3259468a5
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/xhr/same-http.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.keep-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/xhr/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/xhr/same-http.no-redirect.http.html.ini
new file mode 100644
index 00000000000..abfd4e5a022
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/xhr/same-http.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.no-redirect.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/xhr/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/xhr/same-http.swap-origin.http.html.ini
new file mode 100644
index 00000000000..e26de23b9f1
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/xhr/same-http.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-http.swap-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/xhr/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/xhr/same-https.keep-origin.http.html.ini
new file mode 100644
index 00000000000..ebdb0e600dd
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/xhr/same-https.keep-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.keep-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/xhr/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/xhr/same-https.no-redirect.http.html.ini
new file mode 100644
index 00000000000..6e6321f5809
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/xhr/same-https.no-redirect.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.no-redirect.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/xhr/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/xhr/same-https.swap-origin.http.html.ini
new file mode 100644
index 00000000000..6f1817b75a0
--- /dev/null
+++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/xhr/same-https.swap-origin.http.html.ini
@@ -0,0 +1,4 @@
+[same-https.swap-origin.http.html]
+ [`Referer` header with length > 4k is stripped to an origin.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html.ini b/tests/wpt/metadata/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html.ini
index a4d28f41d6d..c9649fc5e0d 100644
--- a/tests/wpt/metadata/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html.ini
@@ -1,5 +1,4 @@
[insecure-protocol.http.html]
- expected: TIMEOUT
[The referrer URL is stripped-referrer when a\n document served over http requires an http\n sub-resource via img-tag using the attr-referrer\n delivery method with keep-origin-redirect and when\n the target request is cross-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html.ini b/tests/wpt/metadata/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html.ini
index 5817eb0da4a..7daf2aa860b 100644
--- a/tests/wpt/metadata/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html.ini
@@ -1,5 +1,4 @@
[insecure-protocol.http.html]
- expected: TIMEOUT
[The referrer URL is stripped-referrer when a\n document served over http requires an http\n sub-resource via img-tag using the attr-referrer\n delivery method with no-redirect and when\n the target request is cross-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html.ini b/tests/wpt/metadata/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html.ini
index ce1aad083cc..8e319a8e648 100644
--- a/tests/wpt/metadata/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html.ini
@@ -1,5 +1,4 @@
[insecure-protocol.http.html]
- expected: TIMEOUT
[The referrer URL is stripped-referrer when a\n document served over http requires an http\n sub-resource via img-tag using the attr-referrer\n delivery method with swap-origin-redirect and when\n the target request is cross-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html.ini b/tests/wpt/metadata/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html.ini
index 8eb8b97559f..f5c95abd0f7 100644
--- a/tests/wpt/metadata/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html.ini
@@ -1,5 +1,4 @@
[upgrade-protocol.http.html]
- expected: TIMEOUT
[The referrer URL is stripped-referrer when a\n document served over http requires an https\n sub-resource via img-tag using the attr-referrer\n delivery method with keep-origin-redirect and when\n the target request is cross-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html.ini b/tests/wpt/metadata/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html.ini
index 846abe7971d..e93a890a004 100644
--- a/tests/wpt/metadata/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html.ini
@@ -1,5 +1,4 @@
[upgrade-protocol.http.html]
- expected: TIMEOUT
[The referrer URL is stripped-referrer when a\n document served over http requires an https\n sub-resource via img-tag using the attr-referrer\n delivery method with no-redirect and when\n the target request is cross-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html.ini b/tests/wpt/metadata/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html.ini
index 50e8f299aeb..e015df4f249 100644
--- a/tests/wpt/metadata/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html.ini
@@ -1,5 +1,4 @@
[upgrade-protocol.http.html]
- expected: TIMEOUT
[The referrer URL is stripped-referrer when a\n document served over http requires an https\n sub-resource via img-tag using the attr-referrer\n delivery method with swap-origin-redirect and when\n the target request is cross-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html.ini b/tests/wpt/metadata/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html.ini
index bba23556c90..955ee280e2b 100644
--- a/tests/wpt/metadata/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html.ini
@@ -1,5 +1,4 @@
[insecure-protocol.http.html]
- expected: TIMEOUT
[The referrer URL is stripped-referrer when a\n document served over http requires an http\n sub-resource via img-tag using the attr-referrer\n delivery method with keep-origin-redirect and when\n the target request is same-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html.ini b/tests/wpt/metadata/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html.ini
index 0d9b95c7b42..1435bba9191 100644
--- a/tests/wpt/metadata/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html.ini
@@ -1,5 +1,4 @@
[insecure-protocol.http.html]
- expected: TIMEOUT
[The referrer URL is stripped-referrer when a\n document served over http requires an http\n sub-resource via img-tag using the attr-referrer\n delivery method with no-redirect and when\n the target request is same-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html.ini b/tests/wpt/metadata/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html.ini
index fe668d7d230..3317e69a9ab 100644
--- a/tests/wpt/metadata/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html.ini
@@ -1,5 +1,4 @@
[insecure-protocol.http.html]
- expected: TIMEOUT
[The referrer URL is stripped-referrer when a\n document served over http requires an http\n sub-resource via img-tag using the attr-referrer\n delivery method with swap-origin-redirect and when\n the target request is same-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html.ini b/tests/wpt/metadata/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html.ini
index e5e190fd617..4527b3f7571 100644
--- a/tests/wpt/metadata/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html.ini
@@ -1,5 +1,4 @@
[upgrade-protocol.http.html]
- expected: TIMEOUT
[The referrer URL is stripped-referrer when a\n document served over http requires an https\n sub-resource via img-tag using the attr-referrer\n delivery method with keep-origin-redirect and when\n the target request is same-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html.ini b/tests/wpt/metadata/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html.ini
index 4816dc6a526..e953608b33f 100644
--- a/tests/wpt/metadata/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html.ini
@@ -1,5 +1,4 @@
[upgrade-protocol.http.html]
- expected: TIMEOUT
[The referrer URL is stripped-referrer when a\n document served over http requires an https\n sub-resource via img-tag using the attr-referrer\n delivery method with no-redirect and when\n the target request is same-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html.ini b/tests/wpt/metadata/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html.ini
index 35bed520d01..2d1e6e7ca18 100644
--- a/tests/wpt/metadata/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html.ini
@@ -1,5 +1,4 @@
[upgrade-protocol.http.html]
- expected: TIMEOUT
[The referrer URL is stripped-referrer when a\n document served over http requires an https\n sub-resource via img-tag using the attr-referrer\n delivery method with swap-origin-redirect and when\n the target request is same-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html.ini b/tests/wpt/metadata/referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html.ini
index 38eb7f5c43f..c576c79d42d 100644
--- a/tests/wpt/metadata/referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html.ini
@@ -1,5 +1,4 @@
[generic.http.html]
- expected: TIMEOUT
[The referrer URL is omitted when a\n document served over http requires an http\n sub-resource via img-tag using the attr-referrer\n delivery method with keep-origin-redirect and when\n the target request is cross-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/img-tag/no-redirect/generic.http.html.ini b/tests/wpt/metadata/referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/img-tag/no-redirect/generic.http.html.ini
index 7258d796a23..c7fb336b158 100644
--- a/tests/wpt/metadata/referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/img-tag/no-redirect/generic.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/img-tag/no-redirect/generic.http.html.ini
@@ -1,5 +1,4 @@
[generic.http.html]
- expected: TIMEOUT
[The referrer URL is omitted when a\n document served over http requires an http\n sub-resource via img-tag using the attr-referrer\n delivery method with no-redirect and when\n the target request is cross-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html.ini b/tests/wpt/metadata/referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html.ini
index e7cfa52a277..ed0c8c56167 100644
--- a/tests/wpt/metadata/referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html.ini
@@ -1,5 +1,4 @@
[generic.http.html]
- expected: TIMEOUT
[The referrer URL is omitted when a\n document served over http requires an http\n sub-resource via img-tag using the attr-referrer\n delivery method with swap-origin-redirect and when\n the target request is cross-origin. (srcdoc iframe inherits parent)]
expected: TIMEOUT
diff --git a/tests/wpt/metadata/referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html.ini b/tests/wpt/metadata/referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html.ini
index 58ad7a29a30..3a78a003c3b 100644
--- a/tests/wpt/metadata/referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html.ini
@@ -1,5 +1,4 @@
[generic.http.html]
- expected: TIMEOUT
[The referrer URL is omitted when a\n document served over http requires an https\n sub-resource via img-tag using the attr-referrer\n delivery method with keep-origin-redirect and when\n the target request is cross-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/img-tag/no-redirect/generic.http.html.ini b/tests/wpt/metadata/referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/img-tag/no-redirect/generic.http.html.ini
index cafac22aa22..607ad0f9d8c 100644
--- a/tests/wpt/metadata/referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/img-tag/no-redirect/generic.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/img-tag/no-redirect/generic.http.html.ini
@@ -1,5 +1,4 @@
[generic.http.html]
- expected: TIMEOUT
[The referrer URL is omitted when a\n document served over http requires an https\n sub-resource via img-tag using the attr-referrer\n delivery method with no-redirect and when\n the target request is cross-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html.ini b/tests/wpt/metadata/referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html.ini
index 31bda0ed8c0..d14f62995ac 100644
--- a/tests/wpt/metadata/referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html.ini
@@ -1,5 +1,4 @@
[generic.http.html]
- expected: TIMEOUT
[The referrer URL is omitted when a\n document served over http requires an https\n sub-resource via img-tag using the attr-referrer\n delivery method with swap-origin-redirect and when\n the target request is cross-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/no-referrer/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html.ini b/tests/wpt/metadata/referrer-policy/no-referrer/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html.ini
index 9ddd4e98f93..f4447f8834a 100644
--- a/tests/wpt/metadata/referrer-policy/no-referrer/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/no-referrer/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html.ini
@@ -1,5 +1,4 @@
[generic.http.html]
- expected: TIMEOUT
[The referrer URL is omitted when a\n document served over http requires an http\n sub-resource via img-tag using the attr-referrer\n delivery method with keep-origin-redirect and when\n the target request is same-origin. (srcdoc iframe inherits parent)]
expected: TIMEOUT
diff --git a/tests/wpt/metadata/referrer-policy/no-referrer/attr-referrer/same-origin/http-http/img-tag/no-redirect/generic.http.html.ini b/tests/wpt/metadata/referrer-policy/no-referrer/attr-referrer/same-origin/http-http/img-tag/no-redirect/generic.http.html.ini
index 863cbd10329..6a892de51ce 100644
--- a/tests/wpt/metadata/referrer-policy/no-referrer/attr-referrer/same-origin/http-http/img-tag/no-redirect/generic.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/no-referrer/attr-referrer/same-origin/http-http/img-tag/no-redirect/generic.http.html.ini
@@ -1,5 +1,4 @@
[generic.http.html]
- expected: TIMEOUT
[The referrer URL is omitted when a\n document served over http requires an http\n sub-resource via img-tag using the attr-referrer\n delivery method with no-redirect and when\n the target request is same-origin. (overridden by srcdoc iframe)]
expected: NOTRUN
diff --git a/tests/wpt/metadata/referrer-policy/no-referrer/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html.ini b/tests/wpt/metadata/referrer-policy/no-referrer/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html.ini
index c25d6026762..d579f324554 100644
--- a/tests/wpt/metadata/referrer-policy/no-referrer/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/no-referrer/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html.ini
@@ -1,5 +1,4 @@
[generic.http.html]
- expected: TIMEOUT
[The referrer URL is omitted when a\n document served over http requires an http\n sub-resource via img-tag using the attr-referrer\n delivery method with swap-origin-redirect and when\n the target request is same-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/no-referrer/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html.ini b/tests/wpt/metadata/referrer-policy/no-referrer/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html.ini
index 98a9a3f7882..41751362a97 100644
--- a/tests/wpt/metadata/referrer-policy/no-referrer/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/no-referrer/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html.ini
@@ -1,5 +1,4 @@
[generic.http.html]
- expected: TIMEOUT
[The referrer URL is omitted when a\n document served over http requires an https\n sub-resource via img-tag using the attr-referrer\n delivery method with keep-origin-redirect and when\n the target request is same-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/no-referrer/attr-referrer/same-origin/http-https/img-tag/no-redirect/generic.http.html.ini b/tests/wpt/metadata/referrer-policy/no-referrer/attr-referrer/same-origin/http-https/img-tag/no-redirect/generic.http.html.ini
index 715a5623432..98b3c72fd5b 100644
--- a/tests/wpt/metadata/referrer-policy/no-referrer/attr-referrer/same-origin/http-https/img-tag/no-redirect/generic.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/no-referrer/attr-referrer/same-origin/http-https/img-tag/no-redirect/generic.http.html.ini
@@ -1,5 +1,4 @@
[generic.http.html]
- expected: TIMEOUT
[The referrer URL is omitted when a\n document served over http requires an https\n sub-resource via img-tag using the attr-referrer\n delivery method with no-redirect and when\n the target request is same-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/no-referrer/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html.ini b/tests/wpt/metadata/referrer-policy/no-referrer/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html.ini
index e9f867552f2..52c8e1b32b0 100644
--- a/tests/wpt/metadata/referrer-policy/no-referrer/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/no-referrer/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html.ini
@@ -1,5 +1,4 @@
[generic.http.html]
- expected: TIMEOUT
[The referrer URL is omitted when a\n document served over http requires an https\n sub-resource via img-tag using the attr-referrer\n delivery method with swap-origin-redirect and when\n the target request is same-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/cross-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/cross-origin.http.html.ini
index f6cc5c8b478..5e309bc9d2b 100644
--- a/tests/wpt/metadata/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/cross-origin.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/cross-origin.http.html.ini
@@ -1,5 +1,4 @@
[cross-origin.http.html]
- expected: TIMEOUT
[The referrer URL is origin when a\n document served over http requires an http\n sub-resource via img-tag using the attr-referrer\n delivery method with keep-origin-redirect and when\n the target request is cross-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/no-redirect/cross-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/no-redirect/cross-origin.http.html.ini
index 0187ec44fdf..3ddaef91ded 100644
--- a/tests/wpt/metadata/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/no-redirect/cross-origin.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/no-redirect/cross-origin.http.html.ini
@@ -1,5 +1,4 @@
[cross-origin.http.html]
- expected: TIMEOUT
[The referrer URL is origin when a\n document served over http requires an http\n sub-resource via img-tag using the attr-referrer\n delivery method with no-redirect and when\n the target request is cross-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/cross-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/cross-origin.http.html.ini
index c7a5821ace3..7c1d3380991 100644
--- a/tests/wpt/metadata/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/cross-origin.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/cross-origin.http.html.ini
@@ -1,5 +1,4 @@
[cross-origin.http.html]
- expected: TIMEOUT
[The referrer URL is origin when a\n document served over http requires an http\n sub-resource via img-tag using the attr-referrer\n delivery method with swap-origin-redirect and when\n the target request is cross-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/cross-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/cross-origin.http.html.ini
index c33ac278441..b59fe1ad8f9 100644
--- a/tests/wpt/metadata/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/cross-origin.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/cross-origin.http.html.ini
@@ -1,5 +1,4 @@
[cross-origin.http.html]
- expected: TIMEOUT
[The referrer URL is origin when a\n document served over http requires an https\n sub-resource via img-tag using the attr-referrer\n delivery method with keep-origin-redirect and when\n the target request is cross-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/no-redirect/cross-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/no-redirect/cross-origin.http.html.ini
index b591c591ad4..1b1e243ae8a 100644
--- a/tests/wpt/metadata/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/no-redirect/cross-origin.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/no-redirect/cross-origin.http.html.ini
@@ -1,5 +1,4 @@
[cross-origin.http.html]
- expected: TIMEOUT
[The referrer URL is origin when a\n document served over http requires an https\n sub-resource via img-tag using the attr-referrer\n delivery method with no-redirect and when\n the target request is cross-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/cross-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/cross-origin.http.html.ini
index 9457b8acc54..b87138016af 100644
--- a/tests/wpt/metadata/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/cross-origin.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/cross-origin.http.html.ini
@@ -1,5 +1,4 @@
[cross-origin.http.html]
- expected: TIMEOUT
[The referrer URL is origin when a\n document served over http requires an https\n sub-resource via img-tag using the attr-referrer\n delivery method with swap-origin-redirect and when\n the target request is cross-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/same-origin-insecure.http.html.ini b/tests/wpt/metadata/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/same-origin-insecure.http.html.ini
index 4b76a9b6851..a94920e8546 100644
--- a/tests/wpt/metadata/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/same-origin-insecure.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/same-origin-insecure.http.html.ini
@@ -1,5 +1,4 @@
[same-origin-insecure.http.html]
- expected: TIMEOUT
[The referrer URL is stripped-referrer when a\n document served over http requires an http\n sub-resource via img-tag using the attr-referrer\n delivery method with keep-origin-redirect and when\n the target request is same-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/no-redirect/same-origin-insecure.http.html.ini b/tests/wpt/metadata/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/no-redirect/same-origin-insecure.http.html.ini
index 49d74de2246..282082fe71d 100644
--- a/tests/wpt/metadata/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/no-redirect/same-origin-insecure.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/no-redirect/same-origin-insecure.http.html.ini
@@ -1,5 +1,4 @@
[same-origin-insecure.http.html]
- expected: TIMEOUT
[The referrer URL is stripped-referrer when a\n document served over http requires an http\n sub-resource via img-tag using the attr-referrer\n delivery method with no-redirect and when\n the target request is same-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/same-origin-insecure.http.html.ini b/tests/wpt/metadata/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/same-origin-insecure.http.html.ini
index a508a5c8310..24fd6d5f003 100644
--- a/tests/wpt/metadata/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/same-origin-insecure.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/same-origin-insecure.http.html.ini
@@ -1,5 +1,4 @@
[same-origin-insecure.http.html]
- expected: TIMEOUT
[The referrer URL is origin when a\n document served over http requires an http\n sub-resource via img-tag using the attr-referrer\n delivery method with swap-origin-redirect and when\n the target request is same-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-upgrade.http.html.ini b/tests/wpt/metadata/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-upgrade.http.html.ini
index 53a47ae1f3e..4ee5eeee1a2 100644
--- a/tests/wpt/metadata/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-upgrade.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-upgrade.http.html.ini
@@ -1,5 +1,4 @@
[same-origin-upgrade.http.html]
- expected: TIMEOUT
[The referrer URL is origin when a\n document served over http requires an https\n sub-resource via img-tag using the attr-referrer\n delivery method with keep-origin-redirect and when\n the target request is same-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/no-redirect/same-origin-upgrade.http.html.ini b/tests/wpt/metadata/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/no-redirect/same-origin-upgrade.http.html.ini
index 97cdb7eb53e..de9d402eccc 100644
--- a/tests/wpt/metadata/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/no-redirect/same-origin-upgrade.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/no-redirect/same-origin-upgrade.http.html.ini
@@ -1,5 +1,4 @@
[same-origin-upgrade.http.html]
- expected: TIMEOUT
[The referrer URL is origin when a\n document served over http requires an https\n sub-resource via img-tag using the attr-referrer\n delivery method with no-redirect and when\n the target request is same-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html.ini b/tests/wpt/metadata/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html.ini
index 4842906dd23..5f52f17f0f2 100644
--- a/tests/wpt/metadata/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html.ini
@@ -1,5 +1,4 @@
[same-origin-insecure.http.html]
- expected: TIMEOUT
[The referrer URL is origin when a\n document served over http requires an https\n sub-resource via img-tag using the attr-referrer\n delivery method with swap-origin-redirect and when\n the target request is same-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/origin/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html.ini b/tests/wpt/metadata/referrer-policy/origin/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html.ini
index 5575d734735..0b2d4c0e8ba 100644
--- a/tests/wpt/metadata/referrer-policy/origin/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/origin/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html.ini
@@ -1,5 +1,4 @@
[generic.http.html]
- expected: TIMEOUT
[The referrer URL is origin when a\n document served over http requires an http\n sub-resource via img-tag using the attr-referrer\n delivery method with keep-origin-redirect and when\n the target request is cross-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/origin/attr-referrer/cross-origin/http-http/img-tag/no-redirect/generic.http.html.ini b/tests/wpt/metadata/referrer-policy/origin/attr-referrer/cross-origin/http-http/img-tag/no-redirect/generic.http.html.ini
index 880256fbfe8..ecaef71c23e 100644
--- a/tests/wpt/metadata/referrer-policy/origin/attr-referrer/cross-origin/http-http/img-tag/no-redirect/generic.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/origin/attr-referrer/cross-origin/http-http/img-tag/no-redirect/generic.http.html.ini
@@ -1,5 +1,4 @@
[generic.http.html]
- expected: TIMEOUT
[The referrer URL is origin when a\n document served over http requires an http\n sub-resource via img-tag using the attr-referrer\n delivery method with no-redirect and when\n the target request is cross-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/origin/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html.ini b/tests/wpt/metadata/referrer-policy/origin/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html.ini
index ec8fee6e5ae..304a1acf5f2 100644
--- a/tests/wpt/metadata/referrer-policy/origin/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/origin/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html.ini
@@ -1,5 +1,4 @@
[generic.http.html]
- expected: TIMEOUT
[The referrer URL is origin when a\n document served over http requires an http\n sub-resource via img-tag using the attr-referrer\n delivery method with swap-origin-redirect and when\n the target request is cross-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/origin/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html.ini b/tests/wpt/metadata/referrer-policy/origin/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html.ini
index 4a538cca739..9cdb290a309 100644
--- a/tests/wpt/metadata/referrer-policy/origin/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/origin/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html.ini
@@ -1,5 +1,4 @@
[generic.http.html]
- expected: TIMEOUT
[The referrer URL is origin when a\n document served over http requires an https\n sub-resource via img-tag using the attr-referrer\n delivery method with keep-origin-redirect and when\n the target request is cross-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/origin/attr-referrer/cross-origin/http-https/img-tag/no-redirect/generic.http.html.ini b/tests/wpt/metadata/referrer-policy/origin/attr-referrer/cross-origin/http-https/img-tag/no-redirect/generic.http.html.ini
index d94a3ae6a77..94f8d127e52 100644
--- a/tests/wpt/metadata/referrer-policy/origin/attr-referrer/cross-origin/http-https/img-tag/no-redirect/generic.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/origin/attr-referrer/cross-origin/http-https/img-tag/no-redirect/generic.http.html.ini
@@ -1,5 +1,4 @@
[generic.http.html]
- expected: TIMEOUT
[The referrer URL is origin when a\n document served over http requires an https\n sub-resource via img-tag using the attr-referrer\n delivery method with no-redirect and when\n the target request is cross-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/origin/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html.ini b/tests/wpt/metadata/referrer-policy/origin/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html.ini
index 0db9a9cc7e8..2ac8ef7ad5f 100644
--- a/tests/wpt/metadata/referrer-policy/origin/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/origin/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html.ini
@@ -1,5 +1,4 @@
[generic.http.html]
- expected: TIMEOUT
[The referrer URL is origin when a\n document served over http requires an https\n sub-resource via img-tag using the attr-referrer\n delivery method with swap-origin-redirect and when\n the target request is cross-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/origin/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html.ini b/tests/wpt/metadata/referrer-policy/origin/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html.ini
index 7311f5838e1..21c6f9e0bf6 100644
--- a/tests/wpt/metadata/referrer-policy/origin/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/origin/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html.ini
@@ -1,5 +1,4 @@
[generic.http.html]
- expected: TIMEOUT
[The referrer URL is origin when a\n document served over http requires an http\n sub-resource via img-tag using the attr-referrer\n delivery method with keep-origin-redirect and when\n the target request is same-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/origin/attr-referrer/same-origin/http-http/img-tag/no-redirect/generic.http.html.ini b/tests/wpt/metadata/referrer-policy/origin/attr-referrer/same-origin/http-http/img-tag/no-redirect/generic.http.html.ini
index 126c3019d1a..20700689b97 100644
--- a/tests/wpt/metadata/referrer-policy/origin/attr-referrer/same-origin/http-http/img-tag/no-redirect/generic.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/origin/attr-referrer/same-origin/http-http/img-tag/no-redirect/generic.http.html.ini
@@ -1,5 +1,4 @@
[generic.http.html]
- expected: TIMEOUT
[The referrer URL is origin when a\n document served over http requires an http\n sub-resource via img-tag using the attr-referrer\n delivery method with no-redirect and when\n the target request is same-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/origin/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html.ini b/tests/wpt/metadata/referrer-policy/origin/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html.ini
index d9aeef5b1f3..f143e4f2171 100644
--- a/tests/wpt/metadata/referrer-policy/origin/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/origin/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html.ini
@@ -1,5 +1,4 @@
[generic.http.html]
- expected: TIMEOUT
[The referrer URL is origin when a\n document served over http requires an http\n sub-resource via img-tag using the attr-referrer\n delivery method with swap-origin-redirect and when\n the target request is same-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/origin/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html.ini b/tests/wpt/metadata/referrer-policy/origin/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html.ini
index 6f3e7511748..b728ffadea0 100644
--- a/tests/wpt/metadata/referrer-policy/origin/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/origin/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html.ini
@@ -1,5 +1,4 @@
[generic.http.html]
- expected: TIMEOUT
[The referrer URL is origin when a\n document served over http requires an https\n sub-resource via img-tag using the attr-referrer\n delivery method with keep-origin-redirect and when\n the target request is same-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/origin/attr-referrer/same-origin/http-https/img-tag/no-redirect/generic.http.html.ini b/tests/wpt/metadata/referrer-policy/origin/attr-referrer/same-origin/http-https/img-tag/no-redirect/generic.http.html.ini
index 56d95eea2f8..670539eff7b 100644
--- a/tests/wpt/metadata/referrer-policy/origin/attr-referrer/same-origin/http-https/img-tag/no-redirect/generic.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/origin/attr-referrer/same-origin/http-https/img-tag/no-redirect/generic.http.html.ini
@@ -1,5 +1,4 @@
[generic.http.html]
- expected: TIMEOUT
[The referrer URL is origin when a\n document served over http requires an https\n sub-resource via img-tag using the attr-referrer\n delivery method with no-redirect and when\n the target request is same-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html.ini b/tests/wpt/metadata/referrer-policy/origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html.ini
index 5cea8df5908..0f023d2b28d 100644
--- a/tests/wpt/metadata/referrer-policy/origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html.ini
@@ -1,5 +1,4 @@
[generic.http.html]
- expected: TIMEOUT
[The referrer URL is origin when a\n document served over http requires an https\n sub-resource via img-tag using the attr-referrer\n delivery method with swap-origin-redirect and when\n the target request is same-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/same-origin/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/cross-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/same-origin/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/cross-origin.http.html.ini
index b39adaf343a..81884cc2da7 100644
--- a/tests/wpt/metadata/referrer-policy/same-origin/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/cross-origin.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/same-origin/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/cross-origin.http.html.ini
@@ -1,5 +1,4 @@
[cross-origin.http.html]
- expected: TIMEOUT
[The referrer URL is omitted when a\n document served over http requires an http\n sub-resource via img-tag using the attr-referrer\n delivery method with keep-origin-redirect and when\n the target request is cross-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/same-origin/attr-referrer/cross-origin/http-http/img-tag/no-redirect/cross-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/same-origin/attr-referrer/cross-origin/http-http/img-tag/no-redirect/cross-origin.http.html.ini
index 66f332d95f3..f624910557c 100644
--- a/tests/wpt/metadata/referrer-policy/same-origin/attr-referrer/cross-origin/http-http/img-tag/no-redirect/cross-origin.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/same-origin/attr-referrer/cross-origin/http-http/img-tag/no-redirect/cross-origin.http.html.ini
@@ -1,5 +1,4 @@
[cross-origin.http.html]
- expected: TIMEOUT
[The referrer URL is omitted when a\n document served over http requires an http\n sub-resource via img-tag using the attr-referrer\n delivery method with no-redirect and when\n the target request is cross-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/same-origin/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/cross-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/same-origin/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/cross-origin.http.html.ini
index 812424da794..f1434c63c97 100644
--- a/tests/wpt/metadata/referrer-policy/same-origin/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/cross-origin.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/same-origin/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/cross-origin.http.html.ini
@@ -1,5 +1,4 @@
[cross-origin.http.html]
- expected: TIMEOUT
[The referrer URL is omitted when a\n document served over http requires an http\n sub-resource via img-tag using the attr-referrer\n delivery method with swap-origin-redirect and when\n the target request is cross-origin. (srcdoc iframe inherits parent)]
expected: TIMEOUT
diff --git a/tests/wpt/metadata/referrer-policy/same-origin/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/cross-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/same-origin/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/cross-origin.http.html.ini
index 43d9bf5b700..fc08a7d2af2 100644
--- a/tests/wpt/metadata/referrer-policy/same-origin/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/cross-origin.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/same-origin/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/cross-origin.http.html.ini
@@ -1,5 +1,4 @@
[cross-origin.http.html]
- expected: TIMEOUT
[The referrer URL is omitted when a\n document served over http requires an https\n sub-resource via img-tag using the attr-referrer\n delivery method with keep-origin-redirect and when\n the target request is cross-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/same-origin/attr-referrer/cross-origin/http-https/img-tag/no-redirect/cross-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/same-origin/attr-referrer/cross-origin/http-https/img-tag/no-redirect/cross-origin.http.html.ini
index ec967f22a89..badc456f6b2 100644
--- a/tests/wpt/metadata/referrer-policy/same-origin/attr-referrer/cross-origin/http-https/img-tag/no-redirect/cross-origin.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/same-origin/attr-referrer/cross-origin/http-https/img-tag/no-redirect/cross-origin.http.html.ini
@@ -1,5 +1,4 @@
[cross-origin.http.html]
- expected: TIMEOUT
[The referrer URL is omitted when a\n document served over http requires an https\n sub-resource via img-tag using the attr-referrer\n delivery method with no-redirect and when\n the target request is cross-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/same-origin/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/cross-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/same-origin/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/cross-origin.http.html.ini
index 8670bf3e1b7..1a6cf370323 100644
--- a/tests/wpt/metadata/referrer-policy/same-origin/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/cross-origin.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/same-origin/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/cross-origin.http.html.ini
@@ -1,5 +1,4 @@
[cross-origin.http.html]
- expected: TIMEOUT
[The referrer URL is omitted when a\n document served over http requires an https\n sub-resource via img-tag using the attr-referrer\n delivery method with swap-origin-redirect and when\n the target request is cross-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/same-origin/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/same-origin-insecure.http.html.ini b/tests/wpt/metadata/referrer-policy/same-origin/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/same-origin-insecure.http.html.ini
index 4b76a9b6851..a94920e8546 100644
--- a/tests/wpt/metadata/referrer-policy/same-origin/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/same-origin-insecure.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/same-origin/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/same-origin-insecure.http.html.ini
@@ -1,5 +1,4 @@
[same-origin-insecure.http.html]
- expected: TIMEOUT
[The referrer URL is stripped-referrer when a\n document served over http requires an http\n sub-resource via img-tag using the attr-referrer\n delivery method with keep-origin-redirect and when\n the target request is same-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/same-origin/attr-referrer/same-origin/http-http/img-tag/no-redirect/same-origin-insecure.http.html.ini b/tests/wpt/metadata/referrer-policy/same-origin/attr-referrer/same-origin/http-http/img-tag/no-redirect/same-origin-insecure.http.html.ini
index 49d74de2246..282082fe71d 100644
--- a/tests/wpt/metadata/referrer-policy/same-origin/attr-referrer/same-origin/http-http/img-tag/no-redirect/same-origin-insecure.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/same-origin/attr-referrer/same-origin/http-http/img-tag/no-redirect/same-origin-insecure.http.html.ini
@@ -1,5 +1,4 @@
[same-origin-insecure.http.html]
- expected: TIMEOUT
[The referrer URL is stripped-referrer when a\n document served over http requires an http\n sub-resource via img-tag using the attr-referrer\n delivery method with no-redirect and when\n the target request is same-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/same-origin/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/same-origin-insecure.http.html.ini b/tests/wpt/metadata/referrer-policy/same-origin/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/same-origin-insecure.http.html.ini
index 021cfd48f95..366f9276118 100644
--- a/tests/wpt/metadata/referrer-policy/same-origin/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/same-origin-insecure.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/same-origin/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/same-origin-insecure.http.html.ini
@@ -1,5 +1,4 @@
[same-origin-insecure.http.html]
- expected: TIMEOUT
[The referrer URL is omitted when a\n document served over http requires an http\n sub-resource via img-tag using the attr-referrer\n delivery method with swap-origin-redirect and when\n the target request is same-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/same-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html.ini b/tests/wpt/metadata/referrer-policy/same-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html.ini
index 31f412bd7a4..5d439aca2d4 100644
--- a/tests/wpt/metadata/referrer-policy/same-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/same-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html.ini
@@ -1,5 +1,4 @@
[same-origin-insecure.http.html]
- expected: TIMEOUT
[The referrer URL is omitted when a\n document served over http requires an https\n sub-resource via img-tag using the attr-referrer\n delivery method with swap-origin-redirect and when\n the target request is same-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/cross-insecure.http.html.ini b/tests/wpt/metadata/referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/cross-insecure.http.html.ini
index 01a929705f3..5c00077ae37 100644
--- a/tests/wpt/metadata/referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/cross-insecure.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/cross-insecure.http.html.ini
@@ -1,5 +1,4 @@
[cross-insecure.http.html]
- expected: TIMEOUT
[The referrer URL is origin when a\n document served over http requires an http\n sub-resource via img-tag using the attr-referrer\n delivery method with keep-origin-redirect and when\n the target request is cross-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/no-redirect/cross-insecure.http.html.ini b/tests/wpt/metadata/referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/no-redirect/cross-insecure.http.html.ini
index 2ac654e6ab3..f02a1ab6d79 100644
--- a/tests/wpt/metadata/referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/no-redirect/cross-insecure.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/no-redirect/cross-insecure.http.html.ini
@@ -1,5 +1,4 @@
[cross-insecure.http.html]
- expected: TIMEOUT
[The referrer URL is origin when a\n document served over http requires an http\n sub-resource via img-tag using the attr-referrer\n delivery method with no-redirect and when\n the target request is cross-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/cross-insecure.http.html.ini b/tests/wpt/metadata/referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/cross-insecure.http.html.ini
index 5b7e2e1cf98..f52e0b7ad3b 100644
--- a/tests/wpt/metadata/referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/cross-insecure.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/cross-insecure.http.html.ini
@@ -1,5 +1,4 @@
[cross-insecure.http.html]
- expected: TIMEOUT
[The referrer URL is origin when a\n document served over http requires an http\n sub-resource via img-tag using the attr-referrer\n delivery method with swap-origin-redirect and when\n the target request is cross-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html.ini b/tests/wpt/metadata/referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html.ini
index c9a0fc65b6f..10748ab0524 100644
--- a/tests/wpt/metadata/referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html.ini
@@ -1,5 +1,4 @@
[upgrade-protocol.http.html]
- expected: TIMEOUT
[The referrer URL is origin when a\n document served over http requires an https\n sub-resource via img-tag using the attr-referrer\n delivery method with keep-origin-redirect and when\n the target request is cross-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html.ini b/tests/wpt/metadata/referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html.ini
index d80fca2621f..080a7dfeb38 100644
--- a/tests/wpt/metadata/referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html.ini
@@ -1,5 +1,4 @@
[upgrade-protocol.http.html]
- expected: TIMEOUT
[The referrer URL is origin when a\n document served over http requires an https\n sub-resource via img-tag using the attr-referrer\n delivery method with no-redirect and when\n the target request is cross-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html.ini b/tests/wpt/metadata/referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html.ini
index b76afe55301..4b67b47c096 100644
--- a/tests/wpt/metadata/referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html.ini
@@ -1,5 +1,4 @@
[upgrade-protocol.http.html]
- expected: TIMEOUT
[The referrer URL is origin when a\n document served over http requires an https\n sub-resource via img-tag using the attr-referrer\n delivery method with swap-origin-redirect and when\n the target request is cross-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/same-insecure.http.html.ini b/tests/wpt/metadata/referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/same-insecure.http.html.ini
index 12109c3e2f4..e4fa5fa3c6a 100644
--- a/tests/wpt/metadata/referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/same-insecure.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/same-insecure.http.html.ini
@@ -1,5 +1,4 @@
[same-insecure.http.html]
- expected: TIMEOUT
[The referrer URL is stripped-referrer when a\n document served over http requires an http\n sub-resource via img-tag using the attr-referrer\n delivery method with keep-origin-redirect and when\n the target request is same-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/no-redirect/same-insecure.http.html.ini b/tests/wpt/metadata/referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/no-redirect/same-insecure.http.html.ini
index bce94de5078..4ce5174baa4 100644
--- a/tests/wpt/metadata/referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/no-redirect/same-insecure.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/no-redirect/same-insecure.http.html.ini
@@ -1,5 +1,4 @@
[same-insecure.http.html]
- expected: TIMEOUT
[The referrer URL is stripped-referrer when a\n document served over http requires an http\n sub-resource via img-tag using the attr-referrer\n delivery method with no-redirect and when\n the target request is same-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/same-insecure.http.html.ini b/tests/wpt/metadata/referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/same-insecure.http.html.ini
index e0542354c35..12f71f35868 100644
--- a/tests/wpt/metadata/referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/same-insecure.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/same-insecure.http.html.ini
@@ -1,5 +1,4 @@
[same-insecure.http.html]
- expected: TIMEOUT
[The referrer URL is origin when a\n document served over http requires an http\n sub-resource via img-tag using the attr-referrer\n delivery method with swap-origin-redirect and when\n the target request is same-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html.ini b/tests/wpt/metadata/referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html.ini
index bbf944474a7..6a81144c4cb 100644
--- a/tests/wpt/metadata/referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html.ini
@@ -1,5 +1,4 @@
[upgrade-protocol.http.html]
- expected: TIMEOUT
[The referrer URL is origin when a\n document served over http requires an https\n sub-resource via img-tag using the attr-referrer\n delivery method with keep-origin-redirect and when\n the target request is same-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html.ini b/tests/wpt/metadata/referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html.ini
index 84111538613..8f926659261 100644
--- a/tests/wpt/metadata/referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html.ini
@@ -1,5 +1,4 @@
[upgrade-protocol.http.html]
- expected: TIMEOUT
[The referrer URL is origin when a\n document served over http requires an https\n sub-resource via img-tag using the attr-referrer\n delivery method with no-redirect and when\n the target request is same-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html.ini b/tests/wpt/metadata/referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html.ini
index bc20341fcaf..160f683a330 100644
--- a/tests/wpt/metadata/referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html.ini
@@ -1,5 +1,4 @@
[upgrade-protocol.http.html]
- expected: TIMEOUT
[The referrer URL is origin when a\n document served over http requires an https\n sub-resource via img-tag using the attr-referrer\n delivery method with swap-origin-redirect and when\n the target request is same-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html.ini b/tests/wpt/metadata/referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html.ini
index f89ac5ccb62..538ea7a5f9e 100644
--- a/tests/wpt/metadata/referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html.ini
@@ -1,5 +1,4 @@
[insecure-protocol.http.html]
- expected: TIMEOUT
[The referrer URL is origin when a\n document served over http requires an http\n sub-resource via img-tag using the attr-referrer\n delivery method with keep-origin-redirect and when\n the target request is cross-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html.ini b/tests/wpt/metadata/referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html.ini
index 8f0b8d0489c..ada87b03af8 100644
--- a/tests/wpt/metadata/referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html.ini
@@ -1,5 +1,4 @@
[insecure-protocol.http.html]
- expected: TIMEOUT
[The referrer URL is origin when a\n document served over http requires an http\n sub-resource via img-tag using the attr-referrer\n delivery method with no-redirect and when\n the target request is cross-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html.ini b/tests/wpt/metadata/referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html.ini
index 1f54b5c38e0..e4c2070160b 100644
--- a/tests/wpt/metadata/referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html.ini
@@ -1,5 +1,4 @@
[insecure-protocol.http.html]
- expected: TIMEOUT
[The referrer URL is origin when a\n document served over http requires an http\n sub-resource via img-tag using the attr-referrer\n delivery method with swap-origin-redirect and when\n the target request is cross-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html.ini b/tests/wpt/metadata/referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html.ini
index c9a0fc65b6f..10748ab0524 100644
--- a/tests/wpt/metadata/referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html.ini
@@ -1,5 +1,4 @@
[upgrade-protocol.http.html]
- expected: TIMEOUT
[The referrer URL is origin when a\n document served over http requires an https\n sub-resource via img-tag using the attr-referrer\n delivery method with keep-origin-redirect and when\n the target request is cross-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html.ini b/tests/wpt/metadata/referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html.ini
index d80fca2621f..080a7dfeb38 100644
--- a/tests/wpt/metadata/referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html.ini
@@ -1,5 +1,4 @@
[upgrade-protocol.http.html]
- expected: TIMEOUT
[The referrer URL is origin when a\n document served over http requires an https\n sub-resource via img-tag using the attr-referrer\n delivery method with no-redirect and when\n the target request is cross-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html.ini b/tests/wpt/metadata/referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html.ini
index b76afe55301..4b67b47c096 100644
--- a/tests/wpt/metadata/referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html.ini
@@ -1,5 +1,4 @@
[upgrade-protocol.http.html]
- expected: TIMEOUT
[The referrer URL is origin when a\n document served over http requires an https\n sub-resource via img-tag using the attr-referrer\n delivery method with swap-origin-redirect and when\n the target request is cross-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/strict-origin/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html.ini b/tests/wpt/metadata/referrer-policy/strict-origin/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html.ini
index f66cc243c02..e4c72a4a8a7 100644
--- a/tests/wpt/metadata/referrer-policy/strict-origin/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/strict-origin/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html.ini
@@ -1,5 +1,4 @@
[insecure-protocol.http.html]
- expected: TIMEOUT
[The referrer URL is origin when a\n document served over http requires an http\n sub-resource via img-tag using the attr-referrer\n delivery method with keep-origin-redirect and when\n the target request is same-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/strict-origin/attr-referrer/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html.ini b/tests/wpt/metadata/referrer-policy/strict-origin/attr-referrer/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html.ini
index 31832cce8d4..5b171264ae0 100644
--- a/tests/wpt/metadata/referrer-policy/strict-origin/attr-referrer/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/strict-origin/attr-referrer/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html.ini
@@ -1,5 +1,4 @@
[insecure-protocol.http.html]
- expected: TIMEOUT
[The referrer URL is origin when a\n document served over http requires an http\n sub-resource via img-tag using the attr-referrer\n delivery method with no-redirect and when\n the target request is same-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/strict-origin/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html.ini b/tests/wpt/metadata/referrer-policy/strict-origin/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html.ini
index 28cad66eec8..22aa5f6125d 100644
--- a/tests/wpt/metadata/referrer-policy/strict-origin/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/strict-origin/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html.ini
@@ -1,5 +1,4 @@
[insecure-protocol.http.html]
- expected: TIMEOUT
[The referrer URL is origin when a\n document served over http requires an http\n sub-resource via img-tag using the attr-referrer\n delivery method with swap-origin-redirect and when\n the target request is same-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/strict-origin/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html.ini b/tests/wpt/metadata/referrer-policy/strict-origin/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html.ini
index bbf944474a7..6a81144c4cb 100644
--- a/tests/wpt/metadata/referrer-policy/strict-origin/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/strict-origin/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html.ini
@@ -1,5 +1,4 @@
[upgrade-protocol.http.html]
- expected: TIMEOUT
[The referrer URL is origin when a\n document served over http requires an https\n sub-resource via img-tag using the attr-referrer\n delivery method with keep-origin-redirect and when\n the target request is same-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/strict-origin/attr-referrer/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html.ini b/tests/wpt/metadata/referrer-policy/strict-origin/attr-referrer/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html.ini
index 84111538613..8f926659261 100644
--- a/tests/wpt/metadata/referrer-policy/strict-origin/attr-referrer/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/strict-origin/attr-referrer/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html.ini
@@ -1,5 +1,4 @@
[upgrade-protocol.http.html]
- expected: TIMEOUT
[The referrer URL is origin when a\n document served over http requires an https\n sub-resource via img-tag using the attr-referrer\n delivery method with no-redirect and when\n the target request is same-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/strict-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html.ini b/tests/wpt/metadata/referrer-policy/strict-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html.ini
index bc20341fcaf..160f683a330 100644
--- a/tests/wpt/metadata/referrer-policy/strict-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/strict-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html.ini
@@ -1,5 +1,4 @@
[upgrade-protocol.http.html]
- expected: TIMEOUT
[The referrer URL is origin when a\n document served over http requires an https\n sub-resource via img-tag using the attr-referrer\n delivery method with swap-origin-redirect and when\n the target request is same-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html.ini b/tests/wpt/metadata/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html.ini
index 06f6b638140..8f0bd4f2c93 100644
--- a/tests/wpt/metadata/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html.ini
@@ -1,5 +1,4 @@
[generic.http.html]
- expected: TIMEOUT
[The referrer URL is stripped-referrer when a\n document served over http requires an http\n sub-resource via img-tag using the attr-referrer\n delivery method with keep-origin-redirect and when\n the target request is cross-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/img-tag/no-redirect/generic.http.html.ini b/tests/wpt/metadata/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/img-tag/no-redirect/generic.http.html.ini
index 2946534ce7f..104fcccc0ec 100644
--- a/tests/wpt/metadata/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/img-tag/no-redirect/generic.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/img-tag/no-redirect/generic.http.html.ini
@@ -1,5 +1,4 @@
[generic.http.html]
- expected: TIMEOUT
[The referrer URL is stripped-referrer when a\n document served over http requires an http\n sub-resource via img-tag using the attr-referrer\n delivery method with no-redirect and when\n the target request is cross-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html.ini b/tests/wpt/metadata/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html.ini
index c51a2737ae8..a9f9146deb1 100644
--- a/tests/wpt/metadata/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html.ini
@@ -1,5 +1,4 @@
[generic.http.html]
- expected: TIMEOUT
[The referrer URL is stripped-referrer when a\n document served over http requires an http\n sub-resource via img-tag using the attr-referrer\n delivery method with swap-origin-redirect and when\n the target request is cross-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html.ini b/tests/wpt/metadata/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html.ini
index 8456e54dcde..8b1dd57f8bd 100644
--- a/tests/wpt/metadata/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html.ini
@@ -1,5 +1,4 @@
[generic.http.html]
- expected: TIMEOUT
[The referrer URL is stripped-referrer when a\n document served over http requires an https\n sub-resource via img-tag using the attr-referrer\n delivery method with keep-origin-redirect and when\n the target request is cross-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/img-tag/no-redirect/generic.http.html.ini b/tests/wpt/metadata/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/img-tag/no-redirect/generic.http.html.ini
index afc225cd19e..337af30e9a5 100644
--- a/tests/wpt/metadata/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/img-tag/no-redirect/generic.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/img-tag/no-redirect/generic.http.html.ini
@@ -1,5 +1,4 @@
[generic.http.html]
- expected: TIMEOUT
[The referrer URL is stripped-referrer when a\n document served over http requires an https\n sub-resource via img-tag using the attr-referrer\n delivery method with no-redirect and when\n the target request is cross-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html.ini b/tests/wpt/metadata/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html.ini
index 6faed8d67f7..28a48dff9f2 100644
--- a/tests/wpt/metadata/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html.ini
@@ -1,5 +1,4 @@
[generic.http.html]
- expected: TIMEOUT
[The referrer URL is stripped-referrer when a\n document served over http requires an https\n sub-resource via img-tag using the attr-referrer\n delivery method with swap-origin-redirect and when\n the target request is cross-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html.ini b/tests/wpt/metadata/referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html.ini
index 2c31558bba2..b3ea065bb25 100644
--- a/tests/wpt/metadata/referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html.ini
@@ -1,5 +1,4 @@
[generic.http.html]
- expected: TIMEOUT
[The referrer URL is stripped-referrer when a\n document served over http requires an http\n sub-resource via img-tag using the attr-referrer\n delivery method with keep-origin-redirect and when\n the target request is same-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/img-tag/no-redirect/generic.http.html.ini b/tests/wpt/metadata/referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/img-tag/no-redirect/generic.http.html.ini
index bcf9dc8f58b..09acf89b576 100644
--- a/tests/wpt/metadata/referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/img-tag/no-redirect/generic.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/img-tag/no-redirect/generic.http.html.ini
@@ -1,5 +1,4 @@
[generic.http.html]
- expected: TIMEOUT
[The referrer URL is stripped-referrer when a\n document served over http requires an http\n sub-resource via img-tag using the attr-referrer\n delivery method with no-redirect and when\n the target request is same-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html.ini b/tests/wpt/metadata/referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html.ini
index a405585e6b5..7aa7efc76a8 100644
--- a/tests/wpt/metadata/referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html.ini
@@ -1,5 +1,4 @@
[generic.http.html]
- expected: TIMEOUT
[The referrer URL is stripped-referrer when a\n document served over http requires an http\n sub-resource via img-tag using the attr-referrer\n delivery method with swap-origin-redirect and when\n the target request is same-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html.ini b/tests/wpt/metadata/referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html.ini
index 5c552e9b729..f5fb2c0da9f 100644
--- a/tests/wpt/metadata/referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html.ini
@@ -1,5 +1,4 @@
[generic.http.html]
- expected: TIMEOUT
[The referrer URL is stripped-referrer when a\n document served over http requires an https\n sub-resource via img-tag using the attr-referrer\n delivery method with keep-origin-redirect and when\n the target request is same-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/img-tag/no-redirect/generic.http.html.ini b/tests/wpt/metadata/referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/img-tag/no-redirect/generic.http.html.ini
index 21cc58e8d88..3a063c3fa57 100644
--- a/tests/wpt/metadata/referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/img-tag/no-redirect/generic.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/img-tag/no-redirect/generic.http.html.ini
@@ -1,5 +1,4 @@
[generic.http.html]
- expected: TIMEOUT
[The referrer URL is stripped-referrer when a\n document served over http requires an https\n sub-resource via img-tag using the attr-referrer\n delivery method with no-redirect and when\n the target request is same-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html.ini b/tests/wpt/metadata/referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html.ini
index b37a1bbae83..3a5aec25199 100644
--- a/tests/wpt/metadata/referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html.ini
+++ b/tests/wpt/metadata/referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html.ini
@@ -1,5 +1,4 @@
[generic.http.html]
- expected: TIMEOUT
[The referrer URL is stripped-referrer when a\n document served over http requires an https\n sub-resource via img-tag using the attr-referrer\n delivery method with swap-origin-redirect and when\n the target request is same-origin.]
expected: FAIL
diff --git a/tests/wpt/metadata/webaudio/the-audio-api/the-audiobuffersourcenode-interface/sub-sample-buffer-stitching.html.ini b/tests/wpt/metadata/webaudio/the-audio-api/the-audiobuffersourcenode-interface/sub-sample-buffer-stitching.html.ini
index dbd302fbd75..8c965580699 100644
--- a/tests/wpt/metadata/webaudio/the-audio-api/the-audiobuffersourcenode-interface/sub-sample-buffer-stitching.html.ini
+++ b/tests/wpt/metadata/webaudio/the-audio-api/the-audiobuffersourcenode-interface/sub-sample-buffer-stitching.html.ini
@@ -50,3 +50,9 @@
[X Stitched sine-wave buffers at sample rate 43800 does not equal [0,0.06264832615852356,0.12505052983760834,0.18696144223213196,0.24813786149024963,0.308339387178421,0.36732959747314453,0.4248766601085663,0.480754554271698,0.5347436666488647,0.5866320133209229,0.6362156271934509,0.6832997798919678,0.7276994585990906,0.7692402601242065,0.8077589869499207...\] with an element-wise tolerance of {"absoluteThreshold":0.0038986,"relativeThreshold":0}.\n\tIndex\tActual\t\t\tExpected\t\tAbsError\t\tRelError\t\tTest threshold\n\t[30\]\t1.9724091887474060e-1\t9.5236867666244507e-1\t7.5512775778770447e-1\t7.9289436569253091e-1\t3.8985999999999999e-3\n\t[60\]\t-2.2450675070285797e-1\t-5.8084785938262939e-1\t3.5634110867977142e-1\t6.1348441407448528e-1\t3.8985999999999999e-3\n\t[90\]\t-3.7808802723884583e-1\t-5.9811043739318848e-1\t2.2002241015434265e-1\t3.6786251568070089e-1\t3.8985999999999999e-3\n\t[120\]\t7.6881676912307739e-1\t9.4563448429107666e-1\t1.7681771516799927e-1\t1.8698315057805445e-1\t3.8985999999999999e-3\n\t[151\]\t5.4644601186737418e-4\t-4.1306272149085999e-2\t4.1852718160953373e-2\t1.0132291292202573e+0\t3.8985999999999999e-3\n\t...and 1419 more errors.\n\tMax AbsError of 1.0373208575716874e+22 at index of 39268.\n\t[39268\]\t-1.0373208575716874e+22\t-9.6925276517868042e-1\t1.0373208575716874e+22\t1.0702273904583173e+22\t3.8985999999999999e-3\n\tMax RelError of 1.0702273904583173e+22 at index of 39268.\n\t[39268\]\t-1.0373208575716874e+22\t-9.6925276517868042e-1\t1.0373208575716874e+22\t1.0702273904583173e+22\t3.8985999999999999e-3\n]
expected: FAIL
+ [X Stitched sine-wave buffers at sample rate 43800 does not equal [0,0.06264832615852356,0.12505052983760834,0.18696144223213196,0.24813786149024963,0.308339387178421,0.36732959747314453,0.4248766601085663,0.480754554271698,0.5347436666488647,0.5866320133209229,0.6362156271934509,0.6832997798919678,0.7276994585990906,0.7692402601242065,0.8077589869499207...\] with an element-wise tolerance of {"absoluteThreshold":0.0038986,"relativeThreshold":0}.\n\tIndex\tActual\t\t\tExpected\t\tAbsError\t\tRelError\t\tTest threshold\n\t[30\]\t1.9724091887474060e-1\t9.5236867666244507e-1\t7.5512775778770447e-1\t7.9289436569253091e-1\t3.8985999999999999e-3\n\t[60\]\t-2.2450675070285797e-1\t-5.8084785938262939e-1\t3.5634110867977142e-1\t6.1348441407448528e-1\t3.8985999999999999e-3\n\t[90\]\t-3.7808802723884583e-1\t-5.9811043739318848e-1\t2.2002241015434265e-1\t3.6786251568070089e-1\t3.8985999999999999e-3\n\t[120\]\t7.6881676912307739e-1\t9.4563448429107666e-1\t1.7681771516799927e-1\t1.8698315057805445e-1\t3.8985999999999999e-3\n\t[151\]\t5.4644601186737418e-4\t-4.1306272149085999e-2\t4.1852718160953373e-2\t1.0132291292202573e+0\t3.8985999999999999e-3\n\t...and 1419 more errors.\n\tMax AbsError of 3.7861355458197831e+32 at index of 39268.\n\t[39268\]\t3.7861355458197831e+32\t-9.6925276517868042e-1\t3.7861355458197831e+32\t3.9062416758974261e+32\t3.8985999999999999e-3\n\tMax RelError of 3.9062416758974261e+32 at index of 39268.\n\t[39268\]\t3.7861355458197831e+32\t-9.6925276517868042e-1\t3.7861355458197831e+32\t3.9062416758974261e+32\t3.8985999999999999e-3\n]
+ expected: FAIL
+
+ [X SNR (-608.3912160578785 dB) is not greater than or equal to 65.737. Got -608.3912160578785.]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/webxr/xrSession_viewer_availability.https.html.ini b/tests/wpt/metadata/webxr/xrSession_viewer_availability.https.html.ini
index f7184958179..60474177872 100644
--- a/tests/wpt/metadata/webxr/xrSession_viewer_availability.https.html.ini
+++ b/tests/wpt/metadata/webxr/xrSession_viewer_availability.https.html.ini
@@ -2,3 +2,6 @@
[Inline viewer support wtih no device]
expected: FAIL
+ [Inline viewer support with no device]
+ expected: FAIL
+
diff --git a/tests/wpt/mozilla/meta/css/transition_calc_implicit.html.ini b/tests/wpt/mozilla/meta/css/transition_calc_implicit.html.ini
deleted file mode 100644
index dbea4f293ad..00000000000
--- a/tests/wpt/mozilla/meta/css/transition_calc_implicit.html.ini
+++ /dev/null
@@ -1,2 +0,0 @@
-[transition_calc_implicit.html]
- expected: TIMEOUT
diff --git a/tests/wpt/web-platform-tests/IndexedDB/idbobjectstore_createIndex15-autoincrement.htm b/tests/wpt/web-platform-tests/IndexedDB/idbobjectstore_createIndex15-autoincrement.htm
index 87ea39ce3d2..c66b81548ad 100644
--- a/tests/wpt/web-platform-tests/IndexedDB/idbobjectstore_createIndex15-autoincrement.htm
+++ b/tests/wpt/web-platform-tests/IndexedDB/idbobjectstore_createIndex15-autoincrement.htm
@@ -1,6 +1,7 @@
<!DOCTYPE html>
<meta charset=utf-8>
<title>IDBObjectStore.createIndex() - AutoIncrement in Compound Index</title>
+<meta name="timeout" content="long">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="support.js"></script>
@@ -49,4 +50,57 @@
},
"Auto-Increment Primary Key"
);
+
+ indexeddb_test(
+ function(t, db, txn) {
+ // Auto-increment
+ var store = db.createObjectStore("Store3", {keyPath: "id", autoIncrement: true});
+ store.createIndex("CompoundKey", ["num", "id", "other"]);
+
+ var num = 100;
+
+ // Add data to Store3 - valid keys
+ // Objects will be stored in Store3 and keys will get added
+ // to the CompoundKeys index.
+ store.put({num: num++, other: 0});
+ store.put({num: num++, other: [0]});
+
+ // Add data - missing key
+ // Objects will be stored in Store3 but keys won't get added to
+ // the CompoundKeys index because the 'other' keypath doesn't
+ // resolve to a value.
+ store.put({num: num++});
+
+ // Add data to Store3 - invalid keys
+ // Objects will be stored in Store3 but keys won't get added to
+ // the CompoundKeys index because the 'other' property values
+ // aren't valid keys.
+ store.put({num: num++, other: null});
+ store.put({num: num++, other: {}});
+ store.put({num: num++, other: [null]});
+ store.put({num: num++, other: [{}]});
+ },
+ function(t, db) {
+ var store = db.transaction("Store3", "readwrite").objectStore("Store3");
+ const keys = [];
+ let count;
+ store.count().onsuccess = t.step_func(e => { count = e.target.result; });
+ store.index("CompoundKey").openCursor().onsuccess = t.step_func(function(e) {
+ const cursor = e.target.result;
+ if (cursor !== null) {
+ keys.push(cursor.key);
+ cursor.continue();
+ return;
+ }
+
+ // Done iteration, check results.
+ assert_equals(count, 7, 'Expected all 7 records to be stored.');
+ assert_equals(keys.length, 2, 'Expected exactly two index entries.');
+ assert_array_equals(keys[0], [100, 1, 0]);
+ assert_object_equals(keys[1], [101, 2, [0]]);
+ t.done();
+ });
+ },
+ "Auto-Increment Primary Key - invalid key values elsewhere"
+ );
</script>
diff --git a/tests/wpt/web-platform-tests/IndexedDB/transaction-relaxed-durability.tentative.any.js b/tests/wpt/web-platform-tests/IndexedDB/transaction-relaxed-durability.tentative.any.js
new file mode 100644
index 00000000000..c6a6f37ba9e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/IndexedDB/transaction-relaxed-durability.tentative.any.js
@@ -0,0 +1,39 @@
+// META: script=support-promises.js
+// META: timeout=long
+
+/**
+ * This file contains the webplatform smoke tests for the optional
+ * relaxedDurability parameter of the IndexedDB transaction API.
+ *
+ * @author enne@chromium.org
+ */
+
+// Smoke test optional parameter on IndexedDB.transaction.
+let cases = [
+ undefined,
+ {},
+ {relaxedDurability: false},
+ {relaxedDurability: true},
+];
+
+for (let i = 0; i < cases.length; ++i) {
+ promise_test(async testCase => {
+ const db = await createDatabase(testCase, db => {
+ createBooksStore(testCase, db);
+ });
+ const txn = db.transaction(['books'], 'readwrite', cases[i]);
+ const objectStore = txn.objectStore('books');
+ objectStore.put({isbn: 'one', title: 'title1'});
+ await promiseForTransaction(testCase, txn);
+
+ const txn2 = db.transaction(['books'], 'readonly');
+ const objectStore2 = txn2.objectStore('books');
+ const getTitle1 = objectStore2.get('one');
+ await promiseForTransaction(testCase, txn2);
+ assert_array_equals(
+ [getTitle1.result.title],
+ ['title1'],
+ 'The title should match that which was put.');
+ db.close();
+ }, 'Committed data can be read back out: case ' + i);
+}
diff --git a/tests/wpt/web-platform-tests/bluetooth/adapter/adapter-absent-getAvailability.https.window.js b/tests/wpt/web-platform-tests/bluetooth/adapter/adapter-absent-getAvailability.https.window.js
index cec09c38b13..a9f540ecd34 100644
--- a/tests/wpt/web-platform-tests/bluetooth/adapter/adapter-absent-getAvailability.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/adapter/adapter-absent-getAvailability.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/adapter/adapter-added-getAvailability.https.window.js b/tests/wpt/web-platform-tests/bluetooth/adapter/adapter-added-getAvailability.https.window.js
index d5e9d1f2b6f..30c47201f07 100644
--- a/tests/wpt/web-platform-tests/bluetooth/adapter/adapter-added-getAvailability.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/adapter/adapter-added-getAvailability.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/adapter/adapter-powered-off-getAvailability.https.window.js b/tests/wpt/web-platform-tests/bluetooth/adapter/adapter-powered-off-getAvailability.https.window.js
index 8fe9265a46e..b760d4bc272 100644
--- a/tests/wpt/web-platform-tests/bluetooth/adapter/adapter-powered-off-getAvailability.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/adapter/adapter-powered-off-getAvailability.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/adapter/adapter-powered-on-getAvailability.https.window.js b/tests/wpt/web-platform-tests/bluetooth/adapter/adapter-powered-on-getAvailability.https.window.js
index 8b9256a4c35..f98a88eea9e 100644
--- a/tests/wpt/web-platform-tests/bluetooth/adapter/adapter-powered-on-getAvailability.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/adapter/adapter-powered-on-getAvailability.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/adapter/adapter-powered-on-off-on-getAvailability.https.window.js b/tests/wpt/web-platform-tests/bluetooth/adapter/adapter-powered-on-off-on-getAvailability.https.window.js
index b8b49121fc0..ac664a89812 100644
--- a/tests/wpt/web-platform-tests/bluetooth/adapter/adapter-powered-on-off-on-getAvailability.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/adapter/adapter-powered-on-off-on-getAvailability.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/adapter/adapter-removed-getAvailability.https.window.js b/tests/wpt/web-platform-tests/bluetooth/adapter/adapter-removed-getAvailability.https.window.js
index cc2c33d1d4c..00425aa56f2 100644
--- a/tests/wpt/web-platform-tests/bluetooth/adapter/adapter-removed-getAvailability.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/adapter/adapter-removed-getAvailability.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/adapter/cross-origin-iframe-getAvailability.sub.https.window.js b/tests/wpt/web-platform-tests/bluetooth/adapter/cross-origin-iframe-getAvailability.sub.https.window.js
index bf5e4226e08..ce633c63f98 100644
--- a/tests/wpt/web-platform-tests/bluetooth/adapter/cross-origin-iframe-getAvailability.sub.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/adapter/cross-origin-iframe-getAvailability.sub.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/characteristic/characteristicProperties.https.window.js b/tests/wpt/web-platform-tests/bluetooth/characteristic/characteristicProperties.https.window.js
index abe9f79ce26..5239accab97 100644
--- a/tests/wpt/web-platform-tests/bluetooth/characteristic/characteristicProperties.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/characteristic/characteristicProperties.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/characteristic/getDescriptor/gen-characteristic-is-removed.https.window.js b/tests/wpt/web-platform-tests/bluetooth/characteristic/getDescriptor/gen-characteristic-is-removed.https.window.js
index 97256a45330..eb91e972c4e 100644
--- a/tests/wpt/web-platform-tests/bluetooth/characteristic/getDescriptor/gen-characteristic-is-removed.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/characteristic/getDescriptor/gen-characteristic-is-removed.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/characteristic/getDescriptor/gen-descriptor-get-same-object.https.window.js b/tests/wpt/web-platform-tests/bluetooth/characteristic/getDescriptor/gen-descriptor-get-same-object.https.window.js
index 8847efab3c1..4cff64bbdad 100644
--- a/tests/wpt/web-platform-tests/bluetooth/characteristic/getDescriptor/gen-descriptor-get-same-object.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/characteristic/getDescriptor/gen-descriptor-get-same-object.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/characteristic/getDescriptor/gen-service-is-removed.https.window.js b/tests/wpt/web-platform-tests/bluetooth/characteristic/getDescriptor/gen-service-is-removed.https.window.js
index b9dc92482ab..f5d1761994a 100644
--- a/tests/wpt/web-platform-tests/bluetooth/characteristic/getDescriptor/gen-service-is-removed.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/characteristic/getDescriptor/gen-service-is-removed.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/characteristic/getDescriptors/gen-characteristic-is-removed-with-uuid.https.window.js b/tests/wpt/web-platform-tests/bluetooth/characteristic/getDescriptors/gen-characteristic-is-removed-with-uuid.https.window.js
index 25bde7cecc5..7405a8ee6e3 100644
--- a/tests/wpt/web-platform-tests/bluetooth/characteristic/getDescriptors/gen-characteristic-is-removed-with-uuid.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/characteristic/getDescriptors/gen-characteristic-is-removed-with-uuid.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/characteristic/getDescriptors/gen-characteristic-is-removed.https.window.js b/tests/wpt/web-platform-tests/bluetooth/characteristic/getDescriptors/gen-characteristic-is-removed.https.window.js
index c3ff9f6a05c..470f7043be3 100644
--- a/tests/wpt/web-platform-tests/bluetooth/characteristic/getDescriptors/gen-characteristic-is-removed.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/characteristic/getDescriptors/gen-characteristic-is-removed.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/characteristic/getDescriptors/gen-descriptor-get-same-object.https.window.js b/tests/wpt/web-platform-tests/bluetooth/characteristic/getDescriptors/gen-descriptor-get-same-object.https.window.js
index c997d7afda2..1dc58aea155 100644
--- a/tests/wpt/web-platform-tests/bluetooth/characteristic/getDescriptors/gen-descriptor-get-same-object.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/characteristic/getDescriptors/gen-descriptor-get-same-object.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/characteristic/getDescriptors/gen-service-is-removed-with-uuid.https.window.js b/tests/wpt/web-platform-tests/bluetooth/characteristic/getDescriptors/gen-service-is-removed-with-uuid.https.window.js
index 03bb51239dc..5ee7e0d2494 100644
--- a/tests/wpt/web-platform-tests/bluetooth/characteristic/getDescriptors/gen-service-is-removed-with-uuid.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/characteristic/getDescriptors/gen-service-is-removed-with-uuid.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/characteristic/getDescriptors/gen-service-is-removed.https.window.js b/tests/wpt/web-platform-tests/bluetooth/characteristic/getDescriptors/gen-service-is-removed.https.window.js
index 762f9cc9955..24a2087e938 100644
--- a/tests/wpt/web-platform-tests/bluetooth/characteristic/getDescriptors/gen-service-is-removed.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/characteristic/getDescriptors/gen-service-is-removed.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/characteristic/notifications/characteristic-is-removed.https.window.js b/tests/wpt/web-platform-tests/bluetooth/characteristic/notifications/characteristic-is-removed.https.window.js
index 6b5d3e22a12..2ab165d9044 100644
--- a/tests/wpt/web-platform-tests/bluetooth/characteristic/notifications/characteristic-is-removed.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/characteristic/notifications/characteristic-is-removed.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/characteristic/notifications/service-is-removed.https.window.js b/tests/wpt/web-platform-tests/bluetooth/characteristic/notifications/service-is-removed.https.window.js
index 29bc671c5d4..d2456934d83 100644
--- a/tests/wpt/web-platform-tests/bluetooth/characteristic/notifications/service-is-removed.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/characteristic/notifications/service-is-removed.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/characteristic/readValue/add-multiple-event-listeners.https.window.js b/tests/wpt/web-platform-tests/bluetooth/characteristic/readValue/add-multiple-event-listeners.https.window.js
index 7e6e4159bb1..13709ea941e 100644
--- a/tests/wpt/web-platform-tests/bluetooth/characteristic/readValue/add-multiple-event-listeners.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/characteristic/readValue/add-multiple-event-listeners.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/characteristic/readValue/characteristic-is-removed.https.window.js b/tests/wpt/web-platform-tests/bluetooth/characteristic/readValue/characteristic-is-removed.https.window.js
index 07678e6e037..269f2cb4a1f 100644
--- a/tests/wpt/web-platform-tests/bluetooth/characteristic/readValue/characteristic-is-removed.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/characteristic/readValue/characteristic-is-removed.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/characteristic/readValue/event-is-fired.https.window.js b/tests/wpt/web-platform-tests/bluetooth/characteristic/readValue/event-is-fired.https.window.js
index eee34d0612d..03b8f2b4cee 100644
--- a/tests/wpt/web-platform-tests/bluetooth/characteristic/readValue/event-is-fired.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/characteristic/readValue/event-is-fired.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/characteristic/readValue/gen-characteristic-is-removed.https.window.js b/tests/wpt/web-platform-tests/bluetooth/characteristic/readValue/gen-characteristic-is-removed.https.window.js
index a2de3c39e20..26efe8b306b 100644
--- a/tests/wpt/web-platform-tests/bluetooth/characteristic/readValue/gen-characteristic-is-removed.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/characteristic/readValue/gen-characteristic-is-removed.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/characteristic/readValue/read-succeeds.https.window.js b/tests/wpt/web-platform-tests/bluetooth/characteristic/readValue/read-succeeds.https.window.js
index aeece7d11f4..82be128f312 100644
--- a/tests/wpt/web-platform-tests/bluetooth/characteristic/readValue/read-succeeds.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/characteristic/readValue/read-succeeds.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/characteristic/readValue/read-updates-value.https.window.js b/tests/wpt/web-platform-tests/bluetooth/characteristic/readValue/read-updates-value.https.window.js
index 45da8af2502..34da455ddff 100644
--- a/tests/wpt/web-platform-tests/bluetooth/characteristic/readValue/read-updates-value.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/characteristic/readValue/read-updates-value.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/characteristic/readValue/service-is-removed.https.window.js b/tests/wpt/web-platform-tests/bluetooth/characteristic/readValue/service-is-removed.https.window.js
index 07e9701d3c3..20dd4ba1c05 100644
--- a/tests/wpt/web-platform-tests/bluetooth/characteristic/readValue/service-is-removed.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/characteristic/readValue/service-is-removed.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/characteristic/service-same-from-2-characteristics.https.window.js b/tests/wpt/web-platform-tests/bluetooth/characteristic/service-same-from-2-characteristics.https.window.js
index e3bc5d0e103..b34b3b9216a 100644
--- a/tests/wpt/web-platform-tests/bluetooth/characteristic/service-same-from-2-characteristics.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/characteristic/service-same-from-2-characteristics.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/characteristic/service-same-object.https.window.js b/tests/wpt/web-platform-tests/bluetooth/characteristic/service-same-object.https.window.js
index 6b1f543ae5e..b58902ae519 100644
--- a/tests/wpt/web-platform-tests/bluetooth/characteristic/service-same-object.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/characteristic/service-same-object.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/characteristic/startNotifications/gen-characteristic-is-removed.https.window.js b/tests/wpt/web-platform-tests/bluetooth/characteristic/startNotifications/gen-characteristic-is-removed.https.window.js
index 76b2d42a481..af27f933d8f 100644
--- a/tests/wpt/web-platform-tests/bluetooth/characteristic/startNotifications/gen-characteristic-is-removed.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/characteristic/startNotifications/gen-characteristic-is-removed.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/characteristic/writeValue/buffer-is-detached.https.window.js b/tests/wpt/web-platform-tests/bluetooth/characteristic/writeValue/buffer-is-detached.https.window.js
index 35347e3bcf8..cefbb6ee8c3 100644
--- a/tests/wpt/web-platform-tests/bluetooth/characteristic/writeValue/buffer-is-detached.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/characteristic/writeValue/buffer-is-detached.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/characteristic/writeValue/characteristic-is-removed.https.window.js b/tests/wpt/web-platform-tests/bluetooth/characteristic/writeValue/characteristic-is-removed.https.window.js
index 33a963bed09..c0f5a3e6509 100644
--- a/tests/wpt/web-platform-tests/bluetooth/characteristic/writeValue/characteristic-is-removed.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/characteristic/writeValue/characteristic-is-removed.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/characteristic/writeValue/gen-characteristic-is-removed.https.window.js b/tests/wpt/web-platform-tests/bluetooth/characteristic/writeValue/gen-characteristic-is-removed.https.window.js
index 00c50894e5b..d5ac10fc611 100644
--- a/tests/wpt/web-platform-tests/bluetooth/characteristic/writeValue/gen-characteristic-is-removed.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/characteristic/writeValue/gen-characteristic-is-removed.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/characteristic/writeValue/service-is-removed.https.window.js b/tests/wpt/web-platform-tests/bluetooth/characteristic/writeValue/service-is-removed.https.window.js
index a9f812c137f..e7a2837c389 100644
--- a/tests/wpt/web-platform-tests/bluetooth/characteristic/writeValue/service-is-removed.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/characteristic/writeValue/service-is-removed.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/characteristic/writeValue/write-succeeds.https.window.js b/tests/wpt/web-platform-tests/bluetooth/characteristic/writeValue/write-succeeds.https.window.js
index 1472c619a2d..cdda9cec345 100644
--- a/tests/wpt/web-platform-tests/bluetooth/characteristic/writeValue/write-succeeds.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/characteristic/writeValue/write-succeeds.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/descriptor/readValue/gen-service-is-removed.https.window.js b/tests/wpt/web-platform-tests/bluetooth/descriptor/readValue/gen-service-is-removed.https.window.js
index 3b6c78a97c5..aa95687094b 100644
--- a/tests/wpt/web-platform-tests/bluetooth/descriptor/readValue/gen-service-is-removed.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/descriptor/readValue/gen-service-is-removed.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/descriptor/readValue/read-succeeds.https.window.js b/tests/wpt/web-platform-tests/bluetooth/descriptor/readValue/read-succeeds.https.window.js
index 5f3c5f8f084..fc1facaf58e 100644
--- a/tests/wpt/web-platform-tests/bluetooth/descriptor/readValue/read-succeeds.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/descriptor/readValue/read-succeeds.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/descriptor/writeValue/buffer-is-detached.https.window.js b/tests/wpt/web-platform-tests/bluetooth/descriptor/writeValue/buffer-is-detached.https.window.js
index 23ea2329a64..2ff277ec949 100644
--- a/tests/wpt/web-platform-tests/bluetooth/descriptor/writeValue/buffer-is-detached.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/descriptor/writeValue/buffer-is-detached.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/descriptor/writeValue/gen-service-is-removed.https.window.js b/tests/wpt/web-platform-tests/bluetooth/descriptor/writeValue/gen-service-is-removed.https.window.js
index ca75ebaba88..a486819b55a 100644
--- a/tests/wpt/web-platform-tests/bluetooth/descriptor/writeValue/gen-service-is-removed.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/descriptor/writeValue/gen-service-is-removed.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/device/gattserverdisconnected-event/disconnected.https.window.js b/tests/wpt/web-platform-tests/bluetooth/device/gattserverdisconnected-event/disconnected.https.window.js
index 245e43d3150..dab54d5da29 100644
--- a/tests/wpt/web-platform-tests/bluetooth/device/gattserverdisconnected-event/disconnected.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/device/gattserverdisconnected-event/disconnected.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/device/gattserverdisconnected-event/disconnected_gc.https.window.js b/tests/wpt/web-platform-tests/bluetooth/device/gattserverdisconnected-event/disconnected_gc.https.window.js
index 69e30443ee6..a15cc943f4e 100644
--- a/tests/wpt/web-platform-tests/bluetooth/device/gattserverdisconnected-event/disconnected_gc.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/device/gattserverdisconnected-event/disconnected_gc.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/device/gattserverdisconnected-event/one-event-per-disconnection.https.window.js b/tests/wpt/web-platform-tests/bluetooth/device/gattserverdisconnected-event/one-event-per-disconnection.https.window.js
index 317eddee9ba..f5e45f99755 100644
--- a/tests/wpt/web-platform-tests/bluetooth/device/gattserverdisconnected-event/one-event-per-disconnection.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/device/gattserverdisconnected-event/one-event-per-disconnection.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/device/gattserverdisconnected-event/reconnect-during-disconnected-event.https.window.js b/tests/wpt/web-platform-tests/bluetooth/device/gattserverdisconnected-event/reconnect-during-disconnected-event.https.window.js
index 93a46eeb934..8f264c7b025 100644
--- a/tests/wpt/web-platform-tests/bluetooth/device/gattserverdisconnected-event/reconnect-during-disconnected-event.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/device/gattserverdisconnected-event/reconnect-during-disconnected-event.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/script-tests/base_test_js.template b/tests/wpt/web-platform-tests/bluetooth/script-tests/base_test_js.template
index 56971d2c6c9..c0fa4aed552 100644
--- a/tests/wpt/web-platform-tests/bluetooth/script-tests/base_test_js.template
+++ b/tests/wpt/web-platform-tests/bluetooth/script-tests/base_test_js.template
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-disconnect-called-before.https.window.js b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-disconnect-called-before.https.window.js
index 2d94b41e020..1eb62d3a311 100644
--- a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-disconnect-called-before.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-disconnect-called-before.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-disconnect-called-during-error.https.window.js b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-disconnect-called-during-error.https.window.js
index 0d6e8a7a179..c7c80244193 100644
--- a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-disconnect-called-during-error.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-disconnect-called-during-error.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-disconnect-called-during-success.https.window.js b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-disconnect-called-during-success.https.window.js
index 18af59d7f80..5655d8ee41c 100644
--- a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-disconnect-called-during-success.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-disconnect-called-during-success.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-disconnect-invalidates-objects.https.window.js b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-disconnect-invalidates-objects.https.window.js
index 5cfe893f5d8..c95f8b921a7 100644
--- a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-disconnect-invalidates-objects.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-disconnect-invalidates-objects.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-disconnected-device.https.window.js b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-disconnected-device.https.window.js
index 622f2cf3212..e610b715b3a 100644
--- a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-disconnected-device.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-disconnected-device.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-discovery-complete-no-permission-absent-service.https.window.js b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-discovery-complete-no-permission-absent-service.https.window.js
index 5afb0262658..ee3cf97f4db 100644
--- a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-discovery-complete-no-permission-absent-service.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-discovery-complete-no-permission-absent-service.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-discovery-complete-service-not-found.https.window.js b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-discovery-complete-service-not-found.https.window.js
index 86fa5e9b011..5bf720cd48e 100644
--- a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-discovery-complete-service-not-found.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-discovery-complete-service-not-found.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-garbage-collection-ran-during-error.https.window.js b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-garbage-collection-ran-during-error.https.window.js
index 2c35c1b7556..4c3111720c2 100644
--- a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-garbage-collection-ran-during-error.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-garbage-collection-ran-during-error.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-garbage-collection-ran-during-success.https.window.js b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-garbage-collection-ran-during-success.https.window.js
index cca8c2c5d2f..fe7d749063d 100644
--- a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-garbage-collection-ran-during-success.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-garbage-collection-ran-during-success.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-get-different-service-after-reconnection.https.window.js b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-get-different-service-after-reconnection.https.window.js
index a0f073d8a31..301658c73bb 100644
--- a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-get-different-service-after-reconnection.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-get-different-service-after-reconnection.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-get-same-object.https.window.js b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-get-same-object.https.window.js
index 3deb387406e..c46a1a52c03 100644
--- a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-get-same-object.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-get-same-object.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-invalid-service-name.https.window.js b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-invalid-service-name.https.window.js
index d59e202d71c..704ab8bb2da 100644
--- a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-invalid-service-name.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-invalid-service-name.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-no-permission-absent-service.https.window.js b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-no-permission-absent-service.https.window.js
index 89ca4688447..8daab29eaf9 100644
--- a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-no-permission-absent-service.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-no-permission-absent-service.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-no-permission-for-any-service.https.window.js b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-no-permission-for-any-service.https.window.js
index fec0055dcdb..d55dee753cf 100644
--- a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-no-permission-for-any-service.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-no-permission-for-any-service.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-no-permission-present-service.https.window.js b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-no-permission-present-service.https.window.js
index a0161a0446b..d357a214dfd 100644
--- a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-no-permission-present-service.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-no-permission-present-service.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-service-not-found.https.window.js b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-service-not-found.https.window.js
index 60fb4f2c529..32350e779dc 100644
--- a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-service-not-found.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryService/gen-service-not-found.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-disconnect-called-before-with-uuid.https.window.js b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-disconnect-called-before-with-uuid.https.window.js
index 86a346d1483..ad446499cba 100644
--- a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-disconnect-called-before-with-uuid.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-disconnect-called-before-with-uuid.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-disconnect-called-before.https.window.js b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-disconnect-called-before.https.window.js
index 97e9f77d12e..485dbb30421 100644
--- a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-disconnect-called-before.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-disconnect-called-before.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-disconnect-called-during-error-with-uuid.https.window.js b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-disconnect-called-during-error-with-uuid.https.window.js
index 37394075d80..230325a8c76 100644
--- a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-disconnect-called-during-error-with-uuid.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-disconnect-called-during-error-with-uuid.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-disconnect-called-during-error.https.window.js b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-disconnect-called-during-error.https.window.js
index 9c7aac67a4a..dce13c5d006 100644
--- a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-disconnect-called-during-error.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-disconnect-called-during-error.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-disconnect-called-during-success-with-uuid.https.window.js b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-disconnect-called-during-success-with-uuid.https.window.js
index bffcea4e9fb..8e2e32ba4fd 100644
--- a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-disconnect-called-during-success-with-uuid.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-disconnect-called-during-success-with-uuid.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-disconnect-called-during-success.https.window.js b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-disconnect-called-during-success.https.window.js
index 162a61f3eb5..78dcffdcbb1 100644
--- a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-disconnect-called-during-success.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-disconnect-called-during-success.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-disconnect-invalidates-objects-with-uuid.https.window.js b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-disconnect-invalidates-objects-with-uuid.https.window.js
index 05dce42424d..d9f61674671 100644
--- a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-disconnect-invalidates-objects-with-uuid.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-disconnect-invalidates-objects-with-uuid.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-disconnect-invalidates-objects.https.window.js b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-disconnect-invalidates-objects.https.window.js
index e17162a7198..b1c9688cc14 100644
--- a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-disconnect-invalidates-objects.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-disconnect-invalidates-objects.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-disconnected-device-with-uuid.https.window.js b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-disconnected-device-with-uuid.https.window.js
index 3bfa60d8ccb..8d64dafb760 100644
--- a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-disconnected-device-with-uuid.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-disconnected-device-with-uuid.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-disconnected-device.https.window.js b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-disconnected-device.https.window.js
index 7072b3efb1f..9c411120a04 100644
--- a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-disconnected-device.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-disconnected-device.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-discovery-complete-no-permission-absent-service-with-uuid.https.window.js b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-discovery-complete-no-permission-absent-service-with-uuid.https.window.js
index 589ebe38644..130657d228f 100644
--- a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-discovery-complete-no-permission-absent-service-with-uuid.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-discovery-complete-no-permission-absent-service-with-uuid.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-discovery-complete-service-not-found-with-uuid.https.window.js b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-discovery-complete-service-not-found-with-uuid.https.window.js
index 15b8b978040..3817a1a5a38 100644
--- a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-discovery-complete-service-not-found-with-uuid.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-discovery-complete-service-not-found-with-uuid.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-garbage-collection-ran-during-error-with-uuid.https.window.js b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-garbage-collection-ran-during-error-with-uuid.https.window.js
index 17495d24eba..c986835ce31 100644
--- a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-garbage-collection-ran-during-error-with-uuid.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-garbage-collection-ran-during-error-with-uuid.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-garbage-collection-ran-during-error.https.window.js b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-garbage-collection-ran-during-error.https.window.js
index 741cd2171f8..bd438db09e3 100644
--- a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-garbage-collection-ran-during-error.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-garbage-collection-ran-during-error.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-garbage-collection-ran-during-success-with-uuid.https.window.js b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-garbage-collection-ran-during-success-with-uuid.https.window.js
index 1ee4f21ccba..3b441cedeff 100644
--- a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-garbage-collection-ran-during-success-with-uuid.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-garbage-collection-ran-during-success-with-uuid.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-garbage-collection-ran-during-success.https.window.js b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-garbage-collection-ran-during-success.https.window.js
index 285b774c4e7..1b3302a1ba6 100644
--- a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-garbage-collection-ran-during-success.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-garbage-collection-ran-during-success.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-get-different-service-after-reconnection-with-uuid.https.window.js b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-get-different-service-after-reconnection-with-uuid.https.window.js
index eb20e6f4b2f..378ade0c90b 100644
--- a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-get-different-service-after-reconnection-with-uuid.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-get-different-service-after-reconnection-with-uuid.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-get-different-service-after-reconnection.https.window.js b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-get-different-service-after-reconnection.https.window.js
index 14fc656c70d..bdef5aa2f20 100644
--- a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-get-different-service-after-reconnection.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-get-different-service-after-reconnection.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-get-same-object-with-uuid.https.window.js b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-get-same-object-with-uuid.https.window.js
index f3fc4906b44..aca34e58ff0 100644
--- a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-get-same-object-with-uuid.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-get-same-object-with-uuid.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-get-same-object.https.window.js b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-get-same-object.https.window.js
index c7c488a18b9..0ea805e339d 100644
--- a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-get-same-object.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-get-same-object.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-invalid-service-name.https.window.js b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-invalid-service-name.https.window.js
index 025f1ccdf7c..eeb6dd4dcf8 100644
--- a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-invalid-service-name.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-invalid-service-name.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-no-permission-absent-service-with-uuid.https.window.js b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-no-permission-absent-service-with-uuid.https.window.js
index 6f1bb251723..c755dd7129d 100644
--- a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-no-permission-absent-service-with-uuid.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-no-permission-absent-service-with-uuid.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-no-permission-for-any-service-with-uuid.https.window.js b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-no-permission-for-any-service-with-uuid.https.window.js
index 4bbddeae56e..03b7f2329c8 100644
--- a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-no-permission-for-any-service-with-uuid.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-no-permission-for-any-service-with-uuid.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-no-permission-for-any-service.https.window.js b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-no-permission-for-any-service.https.window.js
index 40b8b576ff4..e50c6d56128 100644
--- a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-no-permission-for-any-service.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-no-permission-for-any-service.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-no-permission-present-service-with-uuid.https.window.js b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-no-permission-present-service-with-uuid.https.window.js
index 6f737ecf889..c703d0a9363 100644
--- a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-no-permission-present-service-with-uuid.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-no-permission-present-service-with-uuid.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-service-not-found-with-uuid.https.window.js b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-service-not-found-with-uuid.https.window.js
index 33946d281bd..9dc1877f9f2 100644
--- a/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-service-not-found-with-uuid.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/server/getPrimaryServices/gen-service-not-found-with-uuid.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristic/gen-blocklisted-characteristic.https.window.js b/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristic/gen-blocklisted-characteristic.https.window.js
index 04176f1ecda..72b9bac63a4 100644
--- a/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristic/gen-blocklisted-characteristic.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristic/gen-blocklisted-characteristic.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristic/gen-characteristic-not-found.https.window.js b/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristic/gen-characteristic-not-found.https.window.js
index cfec509c492..a8b2ef892c7 100644
--- a/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristic/gen-characteristic-not-found.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristic/gen-characteristic-not-found.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristic/gen-garbage-collection-ran-during-error.https.window.js b/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristic/gen-garbage-collection-ran-during-error.https.window.js
index 9543a5e5633..7457161faa0 100644
--- a/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristic/gen-garbage-collection-ran-during-error.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristic/gen-garbage-collection-ran-during-error.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristic/gen-get-same-object.https.window.js b/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristic/gen-get-same-object.https.window.js
index 73691befa52..54ab061deb9 100644
--- a/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristic/gen-get-same-object.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristic/gen-get-same-object.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristic/gen-invalid-characteristic-name.https.window.js b/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristic/gen-invalid-characteristic-name.https.window.js
index d21dcf56122..8f44ecb08be 100644
--- a/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristic/gen-invalid-characteristic-name.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristic/gen-invalid-characteristic-name.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristic/gen-reconnect-during.https.window.js b/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristic/gen-reconnect-during.https.window.js
index 6f862142464..da5462a8bfa 100644
--- a/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristic/gen-reconnect-during.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristic/gen-reconnect-during.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristic/gen-service-is-removed.https.window.js b/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristic/gen-service-is-removed.https.window.js
index b6d6a9df96e..0fe5b01146e 100644
--- a/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristic/gen-service-is-removed.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristic/gen-service-is-removed.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristics/gen-blocklisted-characteristic-with-uuid.https.window.js b/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristics/gen-blocklisted-characteristic-with-uuid.https.window.js
index 3afd294d5b1..cd8a6fa380a 100644
--- a/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristics/gen-blocklisted-characteristic-with-uuid.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristics/gen-blocklisted-characteristic-with-uuid.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristics/gen-characteristic-not-found-with-uuid.https.window.js b/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristics/gen-characteristic-not-found-with-uuid.https.window.js
index 549f6b26719..fff2bd038a8 100644
--- a/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristics/gen-characteristic-not-found-with-uuid.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristics/gen-characteristic-not-found-with-uuid.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristics/gen-garbage-collection-ran-during-error-with-uuid.https.window.js b/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristics/gen-garbage-collection-ran-during-error-with-uuid.https.window.js
index 643e2f839ef..925786c74de 100644
--- a/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristics/gen-garbage-collection-ran-during-error-with-uuid.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristics/gen-garbage-collection-ran-during-error-with-uuid.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristics/gen-garbage-collection-ran-during-error.https.window.js b/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristics/gen-garbage-collection-ran-during-error.https.window.js
index b7db67f613f..d0ecff89f70 100644
--- a/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristics/gen-garbage-collection-ran-during-error.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristics/gen-garbage-collection-ran-during-error.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristics/gen-get-same-object-with-uuid.https.window.js b/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristics/gen-get-same-object-with-uuid.https.window.js
index 15b552af491..fb3346dc4e4 100644
--- a/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristics/gen-get-same-object-with-uuid.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristics/gen-get-same-object-with-uuid.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristics/gen-get-same-object.https.window.js b/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristics/gen-get-same-object.https.window.js
index df30d514f39..576e0831501 100644
--- a/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristics/gen-get-same-object.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristics/gen-get-same-object.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristics/gen-invalid-characteristic-name.https.window.js b/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristics/gen-invalid-characteristic-name.https.window.js
index f980ac03d5f..5b2bd39d3e0 100644
--- a/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristics/gen-invalid-characteristic-name.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristics/gen-invalid-characteristic-name.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristics/gen-reconnect-during-with-uuid.https.window.js b/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristics/gen-reconnect-during-with-uuid.https.window.js
index eb4233764aa..95f22b11fcf 100644
--- a/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristics/gen-reconnect-during-with-uuid.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristics/gen-reconnect-during-with-uuid.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristics/gen-reconnect-during.https.window.js b/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristics/gen-reconnect-during.https.window.js
index a6d38805973..184632f1d05 100644
--- a/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristics/gen-reconnect-during.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristics/gen-reconnect-during.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristics/gen-service-is-removed-with-uuid.https.window.js b/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristics/gen-service-is-removed-with-uuid.https.window.js
index 527eb765276..6ff7b4f3631 100644
--- a/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristics/gen-service-is-removed-with-uuid.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristics/gen-service-is-removed-with-uuid.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristics/gen-service-is-removed.https.window.js b/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristics/gen-service-is-removed.https.window.js
index 466503241ed..b4492885b83 100644
--- a/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristics/gen-service-is-removed.https.window.js
+++ b/tests/wpt/web-platform-tests/bluetooth/service/getCharacteristics/gen-service-is-removed.https.window.js
@@ -1,5 +1,3 @@
-// META: script=/resources/testharness.js
-// META: script=/resources/testharnessreport.js
// META: script=/resources/testdriver.js
// META: script=/resources/testdriver-vendor.js
// META: script=/bluetooth/resources/bluetooth-helpers.js
diff --git a/tests/wpt/web-platform-tests/common/security-features/README.md b/tests/wpt/web-platform-tests/common/security-features/README.md
index a2ae9aa8e16..deac1ccd895 100644
--- a/tests/wpt/web-platform-tests/common/security-features/README.md
+++ b/tests/wpt/web-platform-tests/common/security-features/README.md
@@ -11,3 +11,96 @@ Subdirectories:
- `scope`:
Serves nested contexts, such as iframe documents or workers.
Used from `invokeFrom*()` functions in `resources/common.js`.
+
+# spec.src.json format
+
+## Source Contexts
+
+In **`source_context_list_schema`**, we can specify
+
+- source contexts from where subresource requests are sent, and
+- how policies are delivered, by source contexts and/or subresource requests.
+
+- `sourceContextList`: an array of `SourceContext` objects, and
+- `subresourcePolicyDeliveries`: an array of `PolicyDelivery` objects.
+
+They have the same object format as described in
+`common/security-features/resources/common.js` comments, and are directly
+serialized to generated HTML files and passed to JavaScript test code,
+except that:
+
+- The first entry of `sourceContextList`'s `sourceContextType` should be
+ always `top`, which represents the top-level generated test HTML.
+ (This entry is omitted in the JSON passed to JavaScript, but
+ the policy deliveries specified here are written as e.g.
+ <meta> elements in the generated test HTML or HTTP headers)
+- Instead of `PolicyDelivery` object (in `sourceContextList` or
+ `subresourcePolicyDeliveries`), following placeholder strings can be used.
+
+The keys of `source_context_list_schema` can be used as the values of
+`source_context_list` fields, to indicate which source context configuration
+to be used.
+
+## PolicyDelivery placeholders
+
+Each test contains
+
+- `delivery_key` (derived from the top-level `delivery_key`) and
+- `delivery_value`, `delivery_type` (derived from `test_expansion`),
+
+which represents the **target policy delivery**, the policy delivery to be
+tested.
+
+The following placeholder strings in `source_context_list_schema` can be used:
+
+- `"policy"`:
+ - Replaced with the target policy delivery.
+ - Can be used to specify where the target policy delivery should be
+ delivered.
+- `"policyIfNonNull"`:
+ - Replaced with the target policy delivery, only if it has non-null value.
+ If the value is null, then the test file is not generated.
+- `"anotherPolicy"`:
+ - Replaced with a `PolicyDelivery` object that has a different value from
+ the target policy delivery.
+ - Can be used to specify e.g. a policy that should be overridden by
+ the target policy delivery.
+
+For example, when the target policy delivery is
+{deliveryType: "http-rp", key: "referrerPolicy", value: "no-referrer"},
+
+ "sourceContextList": [
+ {"sourceContextType": "top", "policyDeliveries": ["anotherPolicy"]},
+ {"sourceContextType": "classic-worker", "policyDeliveries": ["policy"]}
+ ]
+
+is replaced with
+
+ "sourceContextList": [
+ {"sourceContextType": "top", "policyDeliveries": [
+ {"deliveryType": "meta",
+ "key": "referrerPolicy",
+ "value": "unsafe-url"}]
+ },
+ {"sourceContextType": "classic-worker", "policyDeliveries": [
+ {"deliveryType": "http-rp",
+ "key": "referrerPolicy",
+ "value": "no-referrer"}]
+ }
+ ]
+
+which indicates
+
+- The top-level Document has `<meta name="referrer" content="unsafe-url">`.
+- The classic worker is created with
+ `Referrer-Policy: no-referrer` HTTP response headers.
+
+## `source_context_schema` and `subresource_schema`
+
+These represent supported delivery types and subresources
+for each source context or subresource type. These are used
+
+- To filter out test files for unsupported combinations of delivery types,
+ source contexts and subresources.
+- To determine what delivery types should be used for `anotherPolicy`
+ placeholder.
diff --git a/tests/wpt/web-platform-tests/common/security-features/resources/common.js b/tests/wpt/web-platform-tests/common/security-features/resources/common.js
index 7afa6068bf4..6986f841a88 100644
--- a/tests/wpt/web-platform-tests/common/security-features/resources/common.js
+++ b/tests/wpt/web-platform-tests/common/security-features/resources/common.js
@@ -100,7 +100,7 @@
from the outer-most to inner-most environment settings objects.
For example:
- [{sourceContextType: "srcdoc"}, {sourceContextType: "classic-worker"}]
+ [{sourceContextType: "srcdoc"}, {sourceContextType: "worker-classic"}]
means that a subresource request is to be sent from
a classic dedicated worker created from <iframe srcdoc>
inside the top-level HTML document.
@@ -1059,19 +1059,19 @@ function invokeRequest(subresource, sourceContextList) {
"iframe": { // <iframe src="same-origin-URL"></iframe>
invoker: invokeFromIframe,
},
- "classic-worker": {
+ "worker-classic": {
// Classic dedicated worker loaded from same-origin.
invoker: invokeFromWorker.bind(undefined, false, {}),
},
- "classic-data-worker": {
+ "worker-classic-data": {
// Classic dedicated worker loaded from data: URL.
invoker: invokeFromWorker.bind(undefined, true, {}),
},
- "module-worker": {
+ "worker-module": {
// Module dedicated worker loaded from same-origin.
invoker: invokeFromWorker.bind(undefined, false, {type: 'module'}),
},
- "module-data-worker": {
+ "worker-module-data": {
// Module dedicated worker loaded from data: URL.
invoker: invokeFromWorker.bind(undefined, true, {type: 'module'}),
},
diff --git a/tests/wpt/web-platform-tests/common/security-features/tools/generate.py b/tests/wpt/web-platform-tests/common/security-features/tools/generate.py
index 0b18a391a62..0cf7fab42ec 100644
--- a/tests/wpt/web-platform-tests/common/security-features/tools/generate.py
+++ b/tests/wpt/web-platform-tests/common/security-features/tools/generate.py
@@ -1,9 +1,12 @@
from __future__ import print_function
+import argparse
import copy
-import os, sys, json
+import json
+import os
+import sys
+
import spec_validator
-import argparse
import util
@@ -54,7 +57,11 @@ def dump_test_parameters(selection):
del selection['name']
return json.dumps(
- selection, indent=2, separators=(',', ': '), sort_keys=True)
+ selection,
+ indent=2,
+ separators=(',', ': '),
+ sort_keys=True,
+ cls=util.CustomEncoder)
def get_test_filename(config, selection):
@@ -108,7 +115,48 @@ def handle_deliveries(policy_deliveries):
return {"meta": meta, "headers": headers}
-def generate_selection(config, selection, spec, test_html_template_basename):
+def generate_selection(spec_json, config, selection, spec,
+ test_html_template_basename):
+ test_filename = get_test_filename(config, selection)
+
+ target_policy_delivery = util.PolicyDelivery(selection['delivery_type'],
+ selection['delivery_key'],
+ selection['delivery_value'])
+ del selection['delivery_type']
+ del selection['delivery_key']
+ del selection['delivery_value']
+
+ # Parse source context list and policy deliveries of source contexts.
+ # `util.ShouldSkip()` exceptions are raised if e.g. unsuppported
+ # combinations of source contexts and policy deliveries are used.
+ source_context_list_scheme = spec_json['source_context_list_schema'][
+ selection['source_context_list']]
+ selection['source_context_list'] = [
+ util.SourceContext.from_json(source_context, target_policy_delivery,
+ spec_json['source_context_schema'])
+ for source_context in source_context_list_scheme['sourceContextList']
+ ]
+
+ # Check if the subresource is supported by the innermost source context.
+ innermost_source_context = selection['source_context_list'][-1]
+ supported_subresource = spec_json['source_context_schema'][
+ 'supported_subresource'][innermost_source_context.source_context_type]
+ if supported_subresource != '*':
+ if selection['subresource'] not in supported_subresource:
+ raise util.ShouldSkip()
+
+ # Parse subresource policy deliveries.
+ selection[
+ 'subresource_policy_deliveries'] = util.PolicyDelivery.list_from_json(
+ source_context_list_scheme['subresourcePolicyDeliveries'],
+ target_policy_delivery, spec_json['subresource_schema']
+ ['supported_delivery_type'][selection['subresource']])
+
+ # We process the top source context below, and do not include it in
+ # `test_parameters` in JavaScript.
+ top_source_context = selection['source_context_list'].pop(0)
+ assert (top_source_context.source_context_type == 'top')
+
test_parameters = dump_test_parameters(selection)
# Adjust the template for the test invoking JS. Indent it to look nice.
indent = "\n" + " " * 8
@@ -131,7 +179,6 @@ def generate_selection(config, selection, spec, test_html_template_basename):
selection['sanity_checker_js'] = config.sanity_checker_js
selection['spec_json_js'] = config.spec_json_js
- test_filename = get_test_filename(config, selection)
test_headers_filename = test_filename + ".headers"
test_directory = os.path.dirname(test_filename)
@@ -159,11 +206,7 @@ def generate_selection(config, selection, spec, test_html_template_basename):
except:
pass
- delivery = handle_deliveries([
- util.PolicyDelivery(selection['delivery_type'],
- selection['delivery_key'],
- selection['delivery_value'])
- ])
+ delivery = handle_deliveries(top_source_context.policy_deliveries)
if len(delivery['headers']) > 0:
with open(test_headers_filename, "w") as f:
@@ -232,7 +275,11 @@ def generate_test_source_files(config, spec_json, target):
for selection_path in output_dict:
selection = output_dict[selection_path]
- generate_selection(config, selection, spec, html_template)
+ try:
+ generate_selection(spec_json, config, selection, spec,
+ html_template)
+ except util.ShouldSkip:
+ continue
def main(config):
diff --git a/tests/wpt/web-platform-tests/common/security-features/tools/spec_validator.py b/tests/wpt/web-platform-tests/common/security-features/tools/spec_validator.py
index 2c966478869..fff4c5dd6f6 100755
--- a/tests/wpt/web-platform-tests/common/security-features/tools/spec_validator.py
+++ b/tests/wpt/web-platform-tests/common/security-features/tools/spec_validator.py
@@ -57,6 +57,15 @@ def assert_contains_only_fields(obj, expected_fields):
'Unexpected field "%s".' % actual_field
+def leaf_values(schema):
+ if isinstance(schema, list):
+ return schema
+ ret = []
+ for _, sub_schema in schema.iteritems():
+ ret += leaf_values(sub_schema)
+ return ret
+
+
def assert_value_unique_in(value, used_values):
assert value not in used_values, 'Duplicate value "%s"!' % str(value)
used_values[value] = True
@@ -78,8 +87,9 @@ def validate(spec_json, details):
details['object'] = spec_json
assert_contains_only_fields(spec_json, [
- "specification", "delivery_key", "test_expansion_schema",
- "excluded_tests"
+ "specification", "delivery_key", "subresource_schema",
+ "source_context_schema", "source_context_list_schema",
+ "test_expansion_schema", "excluded_tests"
])
assert_non_empty_list(spec_json, "specification")
assert_non_empty_dict(spec_json, "test_expansion_schema")
@@ -91,6 +101,29 @@ def validate(spec_json, details):
valid_test_expansion_fields = ['name'] + test_expansion_schema.keys()
+ valid_source_context_names = [
+ "top", "iframe", "srcdoc", "worker-classic", "worker-module",
+ "worker-classic-data", "worker-module-data"
+ ]
+
+ valid_subresource_names = [
+ "a-tag", "area-tag", "audio-tag", "form-tag", "iframe-tag", "img-tag",
+ "link-css-tag", "link-prefetch-tag", "object-tag", "picture-tag",
+ "script-tag", "video-tag"
+ ] + ["beacon", "fetch", "xhr", "websocket"] + [
+ "worker-classic", "worker-module", "worker-import",
+ "worker-import-data", "sharedworker-classic", "sharedworker-module",
+ "sharedworker-import", "sharedworker-import-data",
+ "serviceworker-classic", "serviceworker-module",
+ "serviceworker-import", "serviceworker-import-data"
+ ] + [
+ "worklet-animation", "worklet-audio", "worklet-layout",
+ "worklet-paint", "worklet-animation-import", "worklet-audio-import",
+ "worklet-layout-import", "worklet-paint-import",
+ "worklet-animation-import-data", "worklet-audio-import-data",
+ "worklet-layout-import-data", "worklet-paint-import-data"
+ ]
+
# Validate each single spec.
for spec in specification:
details['object'] = spec
@@ -123,12 +156,66 @@ def validate(spec_json, details):
test_expansion_schema[artifact])
del details['test_expansion_field']
+ # Validate source_context_schema.
+ details['object'] = spec_json['source_context_schema']
+ assert_contains_only_fields(
+ spec_json['source_context_schema'],
+ ['supported_delivery_type', 'supported_subresource'])
+ assert_contains_only_fields(
+ spec_json['source_context_schema']['supported_delivery_type'],
+ valid_source_context_names)
+ for source_context in spec_json['source_context_schema'][
+ 'supported_delivery_type']:
+ assert_valid_artifact(
+ spec_json['source_context_schema']['supported_delivery_type'],
+ source_context, test_expansion_schema['delivery_type'])
+ assert_contains_only_fields(
+ spec_json['source_context_schema']['supported_subresource'],
+ valid_source_context_names)
+ for source_context in spec_json['source_context_schema'][
+ 'supported_subresource']:
+ assert_valid_artifact(
+ spec_json['source_context_schema']['supported_subresource'],
+ source_context, leaf_values(test_expansion_schema['subresource']))
+
+ # Validate subresource_schema.
+ details['object'] = spec_json['subresource_schema']
+ assert_contains_only_fields(spec_json['subresource_schema'],
+ ['supported_delivery_type'])
+ assert_contains_only_fields(
+ spec_json['subresource_schema']['supported_delivery_type'],
+ leaf_values(test_expansion_schema['subresource']))
+ for subresource in spec_json['subresource_schema'][
+ 'supported_delivery_type']:
+ assert_valid_artifact(
+ spec_json['subresource_schema']['supported_delivery_type'],
+ subresource, test_expansion_schema['delivery_type'])
+
# Validate the test_expansion schema members.
details['object'] = test_expansion_schema
assert_contains_only_fields(test_expansion_schema, [
- 'expansion', 'source_scheme', 'delivery_type', 'delivery_value',
- 'redirection', 'subresource', 'origin', 'expectation'
+ 'expansion', 'source_scheme', 'source_context_list', 'delivery_type',
+ 'delivery_value', 'redirection', 'subresource', 'origin', 'expectation'
+ ])
+ assert_atom_or_list_items_from(test_expansion_schema, 'expansion',
+ ['default', 'override'])
+ assert_atom_or_list_items_from(test_expansion_schema, 'source_scheme',
+ ['http', 'https'])
+ assert_atom_or_list_items_from(
+ test_expansion_schema, 'source_context_list',
+ spec_json['source_context_list_schema'].keys())
+
+ assert_atom_or_list_items_from(test_expansion_schema, 'redirection', [
+ 'no-redirect', 'keep-origin', 'swap-origin', 'keep-scheme',
+ 'swap-scheme'
])
+ for subresource in leaf_values(test_expansion_schema['subresource']):
+ assert subresource in valid_subresource_names, "Invalid subresource %s" % subresource
+ assert_atom_or_list_items_from(test_expansion_schema, 'origin', [
+ 'same-http', 'same-https', 'same-ws', 'same-wss', 'cross-http',
+ 'cross-https', 'cross-ws', 'cross-wss'
+ ])
+
# Validate excluded tests.
details['object'] = excluded_tests
for excluded_test_expansion in excluded_tests:
diff --git a/tests/wpt/web-platform-tests/common/security-features/tools/util.py b/tests/wpt/web-platform-tests/common/security-features/tools/util.py
index fc8d3b30ef7..57e95fea078 100644
--- a/tests/wpt/web-platform-tests/common/security-features/tools/util.py
+++ b/tests/wpt/web-platform-tests/common/security-features/tools/util.py
@@ -41,6 +41,21 @@ def load_spec_json(path_to_spec):
sys.exit(1)
+class ShouldSkip(Exception):
+ '''
+ Raised when the given combination of subresource type, source context type,
+ delivery type etc. are not supported and we should skip that configuration.
+ ShouldSkip is expected in normal generator execution (and thus subsequent
+ generation continues), as we first enumerate a broad range of configurations
+ first, and later raise ShouldSkip to filter out unsupported combinations.
+
+ ShouldSkip is distinguished from other general errors that cause immediate
+ termination of the generator and require fix.
+ '''
+ def __init__(self):
+ pass
+
+
class PolicyDelivery(object):
'''
See `@typedef PolicyDelivery` comments in `resources/common.js`.
@@ -50,3 +65,129 @@ class PolicyDelivery(object):
self.delivery_type = delivery_type
self.key = key
self.value = value
+
+ @classmethod
+ def list_from_json(cls, list, target_policy_delivery,
+ supported_delivery_types):
+ # type: (dict, PolicyDelivery, typing.List[str]) -> typing.List[PolicyDelivery]
+ '''
+ Parses a JSON object `list` that represents a list of `PolicyDelivery`
+ and returns a list of `PolicyDelivery`, plus supporting placeholders
+ (see `from_json()` comments below or
+ `common/security-features/README.md`).
+
+ Can raise `ShouldSkip`.
+ '''
+ if list is None:
+ return []
+
+ out = []
+ for obj in list:
+ policy_delivery = PolicyDelivery.from_json(
+ obj, target_policy_delivery, supported_delivery_types)
+ # Drop entries with null values.
+ if policy_delivery.value is None:
+ continue
+ out.append(policy_delivery)
+ return out
+
+ @classmethod
+ def from_json(cls, obj, target_policy_delivery, supported_delivery_types):
+ # type: (dict, PolicyDelivery, typing.List[str]) -> PolicyDelivery
+ '''
+ Parses a JSON object `obj` and returns a `PolicyDelivery` object.
+ In addition to dicts (in the same format as to_json() outputs),
+ this method accepts the following placeholders:
+ "policy":
+ `target_policy_delivery`
+ "policyIfNonNull":
+ `target_policy_delivery` if its value is not None.
+ "anotherPolicy":
+ A PolicyDelivery that has the same key as
+ `target_policy_delivery` but a different value.
+ The delivery type is selected from `supported_delivery_types`.
+
+ Can raise `ShouldSkip`.
+ '''
+
+ if obj == "policy":
+ policy_delivery = target_policy_delivery
+ elif obj == "nonNullPolicy":
+ if target_policy_delivery.value is None:
+ raise ShouldSkip()
+ policy_delivery = target_policy_delivery
+ elif obj == "anotherPolicy":
+ policy_delivery = target_policy_delivery.get_another_policy(
+ supported_delivery_types[0])
+ elif type(obj) == dict:
+ policy_delivery = PolicyDelivery(obj['deliveryType'], obj['key'],
+ obj['value'])
+ else:
+ raise Exception('policy delivery is invalid: ' + obj)
+
+ # Omit unsupported combinations of source contexts and delivery type.
+ if policy_delivery.delivery_type not in supported_delivery_types:
+ raise ShouldSkip()
+
+ return policy_delivery
+
+ def to_json(self):
+ # type: () -> dict
+ return {
+ "deliveryType": self.delivery_type,
+ "key": self.key,
+ "value": self.value
+ }
+
+ def get_another_policy(self, delivery_type):
+ # type: (str) -> PolicyDelivery
+ if self.key == 'referrerPolicy':
+ if self.value == 'no-referrer':
+ return PolicyDelivery(delivery_type, self.key, 'unsafe-url')
+ else:
+ return PolicyDelivery(delivery_type, self.key, 'no-referrer')
+ else:
+ raise Exception('delivery key is invalid: ' + self.key)
+
+
+class SourceContext(object):
+ def __init__(self, source_context_type, policy_deliveries):
+ # type: (unicode, typing.List[PolicyDelivery]) -> None
+ self.source_context_type = source_context_type
+ self.policy_deliveries = policy_deliveries
+
+ @classmethod
+ def from_json(cls, obj, target_policy_delivery, source_context_schema):
+ '''
+ Parses a JSON object `obj` and returns a `SourceContext` object.
+
+ `target_policy_delivery` and `source_context_schema` are used for
+ policy delivery placeholders and filtering out unsupported
+ delivery types.
+
+ Can raise `ShouldSkip`.
+ '''
+ source_context_type = obj.get('sourceContextType')
+ policy_deliveries = PolicyDelivery.list_from_json(
+ obj.get('policyDeliveries'), target_policy_delivery,
+ source_context_schema['supported_delivery_type']
+ [source_context_type])
+ return SourceContext(source_context_type, policy_deliveries)
+
+ def to_json(self):
+ return {
+ "sourceContextType": self.source_context_type,
+ "policyDeliveries": [x.to_json() for x in self.policy_deliveries]
+ }
+
+
+class CustomEncoder(json.JSONEncoder):
+ '''
+ Used to dump dicts containing `SourceContext`/`PolicyDelivery` into JSON.
+ '''
+ def default(self, obj):
+ if isinstance(obj, SourceContext):
+ return obj.to_json()
+ if isinstance(obj, PolicyDelivery):
+ return obj.to_json()
+ return json.JSONEncoder.default(self, obj)
diff --git a/tests/wpt/web-platform-tests/css/css-contain/contain-size-replaced-004-ref.html b/tests/wpt/web-platform-tests/css/css-contain/contain-size-replaced-004-ref.html
index eba5e8cb9a8..56ca5d2e50e 100644
--- a/tests/wpt/web-platform-tests/css/css-contain/contain-size-replaced-004-ref.html
+++ b/tests/wpt/web-platform-tests/css/css-contain/contain-size-replaced-004-ref.html
@@ -15,9 +15,9 @@
<div>abc</div>
<video></video><br>
<video controls></video><br>
-<img src="../support/60x60-green.png"><br>
+<img src="support/60x60-green.png"><br>
<picture>
-<source srcset="../support/60x60-green.png">
+<source srcset="support/60x60-green.png">
<img>
</picture><br>
<canvas></canvas><br>
diff --git a/tests/wpt/web-platform-tests/css/css-contain/contain-size-replaced-004.html b/tests/wpt/web-platform-tests/css/css-contain/contain-size-replaced-004.html
index 511edadc4f8..9f844815046 100644
--- a/tests/wpt/web-platform-tests/css/css-contain/contain-size-replaced-004.html
+++ b/tests/wpt/web-platform-tests/css/css-contain/contain-size-replaced-004.html
@@ -18,9 +18,9 @@
<div>abc</div>
<video></video><br>
<video controls></video><br>
-<img src="../support/60x60-green.png"><br>
+<img src="support/60x60-green.png"><br>
<picture>
-<source srcset="../support/60x60-green.png">
+<source srcset="support/60x60-green.png">
<img>
</picture><br>
<canvas></canvas><br>
diff --git a/tests/wpt/web-platform-tests/css/css-contain/contain-size-replaced-005-ref.html b/tests/wpt/web-platform-tests/css/css-contain/contain-size-replaced-005-ref.html
index a5328c79ac6..178e137cb72 100644
--- a/tests/wpt/web-platform-tests/css/css-contain/contain-size-replaced-005-ref.html
+++ b/tests/wpt/web-platform-tests/css/css-contain/contain-size-replaced-005-ref.html
@@ -16,9 +16,9 @@
<div>abc</div>
<video></video><br>
<video controls></video><br>
-<img src="../support/60x60-green.png"><br>
+<img src="support/60x60-green.png"><br>
<picture>
-<source srcset="../support/60x60-green.png">
+<source srcset="support/60x60-green.png">
<img>
</picture><br>
<canvas></canvas><br>
diff --git a/tests/wpt/web-platform-tests/css/css-contain/contain-size-replaced-005.html b/tests/wpt/web-platform-tests/css/css-contain/contain-size-replaced-005.html
index e889dcc903c..754f3608e3a 100644
--- a/tests/wpt/web-platform-tests/css/css-contain/contain-size-replaced-005.html
+++ b/tests/wpt/web-platform-tests/css/css-contain/contain-size-replaced-005.html
@@ -19,9 +19,9 @@
<div>abc</div>
<video></video><br>
<video controls></video><br>
-<img src="../support/60x60-green.png"><br>
+<img src="support/60x60-green.png"><br>
<picture>
-<source srcset="../support/60x60-green.png">
+<source srcset="support/60x60-green.png">
<img>
</picture><br>
<canvas></canvas><br>
diff --git a/tests/wpt/web-platform-tests/css/css-contain/contain-size-replaced-006-ref.html b/tests/wpt/web-platform-tests/css/css-contain/contain-size-replaced-006-ref.html
index 2f638d7fe42..d6753c0694b 100644
--- a/tests/wpt/web-platform-tests/css/css-contain/contain-size-replaced-006-ref.html
+++ b/tests/wpt/web-platform-tests/css/css-contain/contain-size-replaced-006-ref.html
@@ -2,9 +2,8 @@
<meta charset="utf-8">
<title>CSS Containment Reference: Size containment replaced elements intrinsic size</title>
<style>
- body > div, video, audio, img, canvas, svg, iframe {
+ div, video, audio, img, canvas, svg, iframe {
border: 3px solid orange;
- contain: size;
margin-bottom: 15px;
width: 25px;
height: 35px;
@@ -15,9 +14,9 @@
<div>abc</div>
<video></video><br>
<video controls></video><br>
-<img src="../support/60x60-green.png"><br>
+<img src="support/60x60-green.png"><br>
<picture>
-<source srcset="../support/60x60-green.png">
+<source srcset="support/60x60-green.png">
<img>
</picture><br>
<canvas></canvas><br>
diff --git a/tests/wpt/web-platform-tests/css/css-contain/contain-size-replaced-006.html b/tests/wpt/web-platform-tests/css/css-contain/contain-size-replaced-006.html
index dccb799ea87..f716ce42a89 100644
--- a/tests/wpt/web-platform-tests/css/css-contain/contain-size-replaced-006.html
+++ b/tests/wpt/web-platform-tests/css/css-contain/contain-size-replaced-006.html
@@ -20,9 +20,9 @@
<div>abc</div>
<video></video><br>
<video controls></video><br>
-<img src="../support/60x60-green.png"><br>
+<img src="support/60x60-green.png"><br>
<picture>
-<source srcset="../support/60x60-green.png">
+<source srcset="support/60x60-green.png">
<img>
</picture><br>
<canvas></canvas><br>
diff --git a/tests/wpt/web-platform-tests/css/css-contain/support/60x60-green.png b/tests/wpt/web-platform-tests/css/css-contain/support/60x60-green.png
new file mode 100644
index 00000000000..b3c8cf3eb4c
--- /dev/null
+++ b/tests/wpt/web-platform-tests/css/css-contain/support/60x60-green.png
Binary files differ
diff --git a/tests/wpt/web-platform-tests/css/css-contain/support/60x60-red.png b/tests/wpt/web-platform-tests/css/css-contain/support/60x60-red.png
new file mode 100644
index 00000000000..823f125b8e4
--- /dev/null
+++ b/tests/wpt/web-platform-tests/css/css-contain/support/60x60-red.png
Binary files differ
diff --git a/tests/wpt/web-platform-tests/css/css-flexbox/flex-wrap-006.html b/tests/wpt/web-platform-tests/css/css-flexbox/flex-wrap-006.html
new file mode 100644
index 00000000000..e616412c2b2
--- /dev/null
+++ b/tests/wpt/web-platform-tests/css/css-flexbox/flex-wrap-006.html
@@ -0,0 +1,32 @@
+<!DOCTYPE html>
+<title>CSS Flexbox Test: Tests correct block size with percentages and dynamic changes</title>
+<link rel="author" title="Google LLC" href="http://www.google.com">
+<link rel="match" href="../reference/ref-filled-green-100px-square.xht">
+<link rel="help" href="https://bugs.chromium.org/p/chromium/issues/detail?id=999253" />
+<link rel="help" href="https://drafts.csswg.org/css-flexbox/#cross-sizing" />
+
+<p>Test passes if there is a filled green square and <strong>no red</strong>.</p>
+
+<!-- Each item should stretch to the size of the flex line. Because the first
+ item has no explicit height, the percentage should resolve to zero in
+ the line height calculation stage, so the second item should determine
+ the total height (500px at first, 100px after the change). When the first
+ item gets relaid out for stretching, the percentage can resolve.
+ The bug that motivated this testcase resolved the line height using
+ the previous post-stretching height of the first flex item (and
+ therefore resolves the percentage against 500px), which is incorrect.
+ -->
+<div id="flex" style="display: flex; flex-wrap: wrap;">
+ <div>
+ <div style="height: 100%; background: green; width: 100px;"></div>
+ </div>
+ <div style="height: 500px;" id="item"></div>
+</div>
+
+<script>
+var flex = document.getElementById("flex");
+flex.offsetHeight;
+var item2 = document.getElementById("item");
+item2.style.height = "100px";
+</script>
+
diff --git a/tests/wpt/web-platform-tests/css/css-position/position-absolute-dynamic-static-position-table-cell.html b/tests/wpt/web-platform-tests/css/css-position/position-absolute-dynamic-static-position-table-cell.html
new file mode 100644
index 00000000000..3a28b205f24
--- /dev/null
+++ b/tests/wpt/web-platform-tests/css/css-position/position-absolute-dynamic-static-position-table-cell.html
@@ -0,0 +1,32 @@
+<!DOCTYPE html>
+<link rel="match" href="../reference/ref-filled-green-100px-square.xht">
+<link rel="help" href="https://www.w3.org/TR/css-position-3/" />
+<meta name="assert" content="This test checks that a dynamic change in constraints calculates the static position correctly for table-cells."/>
+<style>
+#table-cell {
+ position: relative;
+ display: table-cell;
+ vertical-align: middle;
+
+ width: 100px;
+ height: 100px;
+ background: red;
+}
+
+#target {
+ position: absolute;
+ translate: 0 -50px;
+
+ width: 100px;
+ height: 100px;
+ background: green;
+}
+</style>
+<p>Test passes if there is a filled green square and <strong>no red</strong>.</p>
+<div id="table-cell">
+ <div id="target" style="top: 0;"></div>
+</div>
+<script>
+document.body.offsetTop;
+document.getElementById('target').style.top = 'auto';
+</script>
diff --git a/tests/wpt/web-platform-tests/css/css-sizing/block-fit-content-as-initial-ref.html b/tests/wpt/web-platform-tests/css/css-sizing/block-fit-content-as-initial-ref.html
new file mode 100644
index 00000000000..7fdc142534e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/css/css-sizing/block-fit-content-as-initial-ref.html
@@ -0,0 +1,6 @@
+<!DOCTYPE html>
+<body>
+ <div class='parent'>
+ <img class='child' src='../support/60x60-green.png'>
+ </div>
+</body>
diff --git a/tests/wpt/web-platform-tests/css/css-sizing/block-fit-content-as-initial.html b/tests/wpt/web-platform-tests/css/css-sizing/block-fit-content-as-initial.html
new file mode 100644
index 00000000000..7c9422cb5bc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/css/css-sizing/block-fit-content-as-initial.html
@@ -0,0 +1,18 @@
+<!DOCTYPE html>
+<title>CSS Test: Test `fit-content` for block axis behaves the same as the initial value</title>
+<link rel="match" href="block-fit-content-as-initial-ref.html">
+<link rel="help" href="https://www.w3.org/TR/css-sizing-3/#valdef-width-fit-content-length-percentage">
+<link rel="author" title="Koji Ishii" href="mailto:kojii@chromium.org">
+<style>
+.parent {
+ height: fit-content;
+}
+.child {
+ max-height: 100%;
+}
+</style>
+<body>
+ <div class='parent'>
+ <img class='child' src='../support/60x60-green.png'>
+ </div>
+</body>
diff --git a/tests/wpt/web-platform-tests/css/css-text/overflow-wrap/overflow-wrap-break-word-white-space-crash.html b/tests/wpt/web-platform-tests/css/css-text/overflow-wrap/overflow-wrap-break-word-white-space-crash.html
new file mode 100644
index 00000000000..2bea6aed780
--- /dev/null
+++ b/tests/wpt/web-platform-tests/css/css-text/overflow-wrap/overflow-wrap-break-word-white-space-crash.html
@@ -0,0 +1,28 @@
+<!DOCTYPE html>
+<title>CSS Text Test: A combination of `overflow-wrap: break-word` and `white-space` should not crash</title>
+<link rel="help" href="https://crbug.com/988832">
+<link rel="author" title="Koji Ishii" href="mailto:kojii@chromium.org">
+<script src="/resources/testharness.js"></script>
+<script src="/resources/testharnessreport.js"></script>
+<style>
+div {
+ width: 10ch;
+ border: 1px blue solid;
+ overflow-wrap: break-word;
+}
+inline-block {
+ display: inline-block;
+ position: relative;
+ width: 3ch;
+ height: 1em;
+ background: orange;
+}
+</style>
+<body>
+<div>
+ 123 56 <span style="white-space: pre"><inline-block></inline-block> <span style="white-space: normal">Flash</span></span> and
+</div>
+<script>
+test(() => { });
+</script>
+</body>
diff --git a/tests/wpt/web-platform-tests/css/css-values/calc-zero-percent-height.html b/tests/wpt/web-platform-tests/css/css-values/calc-zero-percent-height.html
new file mode 100644
index 00000000000..ffb2ecd6dc9
--- /dev/null
+++ b/tests/wpt/web-platform-tests/css/css-values/calc-zero-percent-height.html
@@ -0,0 +1,30 @@
+<!doctype html>
+<link rel="help" href="https://www.w3.org/TR/css-values-4/#calc-computed-value">
+<link rel="help" href="https://www.w3.org/TR/CSS2/visudet.html#the-height-property">
+<link rel="author" title="Xiaocheng Hu" href="mailto:xiaochengh@chromium.org">
+<link rel="match" href="../reference/ref-filled-green-100px-square-only.html">
+<title>0% in calc() should be preserved</title>
+<script>
+CSS.registerProperty({
+ name: '--custom-height',
+ syntax: '<length-percentage>',
+ initialValue: 'calc(0% + 0px)',
+ inherits: false
+});
+</script>
+<style>
+.height-filler {
+ height: 100px;
+}
+
+.test {
+ width: 100px;
+ height: var(--custom-height);
+ background-color: green;
+}
+</style>
+<p>Test passes if there is a filled green square.</p>
+<div class="test">
+ <div class="height-filler">
+ </div>
+</div>
diff --git a/tests/wpt/web-platform-tests/css/css-variables/vars-font-shorthand-001.html b/tests/wpt/web-platform-tests/css/css-variables/vars-font-shorthand-001.html
index 3c280547fb3..e10aa87c494 100644
--- a/tests/wpt/web-platform-tests/css/css-variables/vars-font-shorthand-001.html
+++ b/tests/wpt/web-platform-tests/css/css-variables/vars-font-shorthand-001.html
@@ -4,6 +4,7 @@
<link rel="help" href="https://www.w3.org/TR/css-variables-1/#variables-in-shorthands">
<link rel="match" href="reference/vars-font-shorthand-001-ref.html">
<meta name="flags" content="ahem">
+<link rel="stylesheet" type="text/css" href="/fonts/ahem.css">
<style>
div {
diff --git a/tests/wpt/web-platform-tests/css/css-writing-modes/available-size-003.html b/tests/wpt/web-platform-tests/css/css-writing-modes/available-size-003.html
index c938c905ae0..70a61a9e344 100644
--- a/tests/wpt/web-platform-tests/css/css-writing-modes/available-size-003.html
+++ b/tests/wpt/web-platform-tests/css/css-writing-modes/available-size-003.html
@@ -7,7 +7,7 @@
<meta name="assert" content="When an orthogonal flow's parent doesn't have a definite block size and the nearest ancestor scroller does have a fixed height, use that, making sure you stick with the content height.">
<meta name="flags" content="">
<style>
-body > div {
+#scroller {
font-family: monospace; /* to be able to reliably measure things in ch*/
font-size: 20px;
height: 8ch;
@@ -15,12 +15,11 @@ body > div {
overflow: hidden;
color: transparent;
position: relative; /* to act as a container of #red */
- writing-mode: vertical-lr;
padding: 1ch 0;
}
-div > div { padding-bottom: 2ch; } /* so that the content height of the parent and of the fixed size scrolling ancestor are different */
-div > div > div { writing-mode: vertical-rl; }
+#parent { padding-bottom: 2ch; } /* so that the content height of the parent and of the fixed size scrolling ancestor are different */
+#ortho { writing-mode: vertical-rl; }
span {
background: green;
@@ -38,9 +37,11 @@ span {
<p>Test passes if there is a <strong>green rectangle</strong> below and <strong>no red</strong>.
-<div>
- <aside id="red">0</aside>
- <div><div>0 0 0 0 <span>0</span> 0 0 0</div></div> <!-- If this div take its height from
- the height of its scrollable ancestor, it should wrap just right for the green 0 to
- overlap with the red one. -->
+<div id=scroller>
+ <aside id=red>0</aside>
+ <div id=parent>
+ <div id=ortho>0 0 0 0 <span>0</span> 0 0 0</div>
+ <!-- If this div take its height from the height of its scrollable ancestor,
+ it should wrap just right for the green 0 to overlap with the red one. -->
+ </div>
</div>
diff --git a/tests/wpt/web-platform-tests/css/css-writing-modes/available-size-005.html b/tests/wpt/web-platform-tests/css/css-writing-modes/available-size-005.html
index ee324898ffe..5eb832ff36e 100644
--- a/tests/wpt/web-platform-tests/css/css-writing-modes/available-size-005.html
+++ b/tests/wpt/web-platform-tests/css/css-writing-modes/available-size-005.html
@@ -7,7 +7,7 @@
<meta name="assert" content="When an orthogonal flow's parent doesn't have a definite block size and the nearest ancestor scroller does a have fixed height, use that whole height, even if some other content already consumes some of it.">
<meta name="flags" content="">
<style>
-body > div {
+#scroller {
font-family: monospace; /* to be able to reliably measure things in ch*/
font-size: 20px;
height: 8ch;
@@ -17,8 +17,8 @@ body > div {
position: relative; /* to act as a container of #red */
}
-div > div { padding-bottom: 2ch; } /* so that the content height of the parent and of the fixed size scrolling ancestor are different */
-div > div > div { writing-mode: vertical-rl; }
+#parent { padding-bottom: 2ch; } /* so that the content height of the parent and of the fixed size scrolling ancestor are different */
+#ortho { writing-mode: vertical-rl; }
span {
background: green;
@@ -41,9 +41,12 @@ span {
<p>Test passes if there is a <strong>green rectangle</strong> below and <strong>no red</strong>.
-<div>
+<div id=scroller>
<aside id="red">0</aside>
- <div><aside id="spacer"></aside><div>0 0 0 0 <span>0</span> 0 0 0</div></div>
+ <div id=parent>
+ <aside id=spacer></aside>
+ <div id=ortho>0 0 0 0 <span>0</span> 0 0 0</div>
+ </div>
<!-- If the inner div take its height from the height of its scrollable
ancestor, it should wrap just right for the green 0 to overlap with the red
one. If instead it takes it size from the remaining height after having
diff --git a/tests/wpt/web-platform-tests/css/css-writing-modes/available-size-009.html b/tests/wpt/web-platform-tests/css/css-writing-modes/available-size-009.html
index 5e26975999e..94f083af584 100644
--- a/tests/wpt/web-platform-tests/css/css-writing-modes/available-size-009.html
+++ b/tests/wpt/web-platform-tests/css/css-writing-modes/available-size-009.html
@@ -9,7 +9,7 @@
<style>
body { margin-top: 0; margin-bottom: 0; } /* Shouldn't matter, but in some browsers does. -007 tests this aspect specifically. */
:root { overflow: hidden; }
-div {
+#ortho {
writing-mode: vertical-rl;
font-family: monospace;
font-size: 20px;
@@ -17,7 +17,7 @@ div {
}
.spacer { /* using 5 spacers of 20vh each instead of a single large one, so
that the line would wrap between spacers if it ends up being
- shorter thatn 100vh*/
+ shorter than 100vh*/
display: inline-block;
height: calc(20vh - 0.1px); /*Using this instead of 20vh, to account for accumulation of rounding errors, that might make 5*20vh taller than 100vh in some browsers*/
}
@@ -38,18 +38,21 @@ span {
left: 0; top: 0;
}
-section {
+#scroller {
overflow: hidden;
- writing-mode: vertical-rl;
+ writing-mode: vertical-lr;
height: 120vh;
}
-section > section {
+#parent {
writing-mode: horizontal-tb;
+ width: 8em; /* avoid triggering intrinsic sizing bugs */
}
</style>
<p>Test passes if there is a <strong>green rectangle</strong> below and <strong>no red</strong>.
-<section>
-<div><aside id="red">0</aside><aside class="spacer"></aside><aside class="spacer"></aside><aside class="spacer"></aside><aside class="spacer"></aside><aside class="spacer"></aside><aside class="spacer"></aside><aside class="spacer"></aside><aside class="spacer"></aside><aside class="spacer"></aside><aside class="spacer"></aside> <span>0</span></div>
-</section>
+<div id=scroller>
+ <div id=parent>
+ <div id=ortho><aside id="red">0</aside><aside class="spacer"></aside><aside class="spacer"></aside><aside class="spacer"></aside><aside class="spacer"></aside><aside class="spacer"></aside><aside class="spacer"></aside><aside class="spacer"></aside><aside class="spacer"></aside><aside class="spacer"></aside><aside class="spacer"></aside> <span>0</span></div>
+ </div>
+</div>
diff --git a/tests/wpt/web-platform-tests/css/css-writing-modes/available-size-013.html b/tests/wpt/web-platform-tests/css/css-writing-modes/available-size-013.html
index 1ffd6564ad0..4cb6b237285 100644
--- a/tests/wpt/web-platform-tests/css/css-writing-modes/available-size-013.html
+++ b/tests/wpt/web-platform-tests/css/css-writing-modes/available-size-013.html
@@ -7,7 +7,7 @@
<meta name="assert" content="When an orthogonal flow's parent doesn't have a definite block size and the nearest ancestor scroller does have a fixed height, use that, increased by the min-height if it is set and is larger (same as -003, with min-height).">
<meta name="flags" content="">
<style>
-body > div {
+#scroller {
font-family: monospace; /* to be able to reliably measure things in ch*/
font-size: 20px;
height: 4ch;
@@ -16,12 +16,11 @@ body > div {
overflow: hidden;
color: transparent;
position: relative; /* to act as a container of #red */
- writing-mode: vertical-lr;
padding: 1ch 0;
}
-div > div { padding-bottom: 2ch; } /* so that the content height of the parent and of the fixed size scrolling ancestor are different */
-div > div > div { writing-mode: vertical-rl; }
+#parent { padding-bottom: 2ch; } /* so that the content height of the parent and of the fixed size scrolling ancestor are different */
+#ortho { writing-mode: vertical-rl; }
span {
background: green;
@@ -39,9 +38,11 @@ span {
<p>Test passes if there is a <strong>green rectangle</strong> below and <strong>no red</strong>.
-<div>
- <aside id="red">0</aside>
- <div><div>0 0 0 0 <span>0</span> 0 0 0</div></div> <!-- If this div take its height from
- the height of its scrollable ancestor, it should wrap just right for the green 0 to
- overlap with the red one. -->
+<div id=scroller>
+ <aside id=red>0</aside>
+ <div id=parent>
+ <div id=ortho>0 0 0 0 <span>0</span> 0 0 0</div>
+ <!-- If this div take its height from the height of its scrollable ancestor,
+ it should wrap just right for the green 0 to overlap with the red one. -->
+ </div>
</div>
diff --git a/tests/wpt/web-platform-tests/css/css-writing-modes/available-size-014.html b/tests/wpt/web-platform-tests/css/css-writing-modes/available-size-014.html
index e0e41fb6b1a..8e955cf5902 100644
--- a/tests/wpt/web-platform-tests/css/css-writing-modes/available-size-014.html
+++ b/tests/wpt/web-platform-tests/css/css-writing-modes/available-size-014.html
@@ -7,7 +7,7 @@
<meta name="assert" content="When an orthogonal flow's parent doesn't have a definite block size and the nearest ancestor scroller does a have fixed height, use that whole height increased by min-height if that's larger, even if some other content already consumes some of it (same as -005, with min-height).">
<meta name="flags" content="">
<style>
-body > div {
+#scroller {
font-family: monospace; /* to be able to reliably measure things in ch*/
font-size: 20px;
height: 4ch;
@@ -18,8 +18,8 @@ body > div {
position: relative; /* to act as a container of #red */
}
-div > div { padding-bottom: 2ch; } /* so that the content height of the parent and of the fixed size scrolling ancestor are different */
-div > div > div { writing-mode: vertical-rl; }
+#parent { padding-bottom: 2ch; } /* so that the content height of the parent and of the fixed size scrolling ancestor are different */
+#ortho { writing-mode: vertical-rl; }
span {
background: green;
@@ -42,9 +42,12 @@ span {
<p>Test passes if there is a <strong>green rectangle</strong> below and <strong>no red</strong>.
-<div>
+<div id=scroller>
<aside id="red">0</aside>
- <div><aside id="spacer"></aside><div>0 0 0 0 <span>0</span> 0 0 0</div></div>
+ <div id=parent>
+ <aside id=spacer></aside>
+ <div id=ortho>0 0 0 0 <span>0</span> 0 0 0</div>
+ </div>
<!-- If the inner div take its height from the height of its scrollable
ancestor, it should wrap just right for the green 0 to overlap with the red
one. If instead it takes it size from the remaining height after having
diff --git a/tests/wpt/web-platform-tests/css/css-writing-modes/available-size-016.html b/tests/wpt/web-platform-tests/css/css-writing-modes/available-size-016.html
index 15038868b80..ba398032ba7 100644
--- a/tests/wpt/web-platform-tests/css/css-writing-modes/available-size-016.html
+++ b/tests/wpt/web-platform-tests/css/css-writing-modes/available-size-016.html
@@ -9,7 +9,7 @@
<style>
body { margin-top: 0; margin-bottom: 0; } /* Shouldn't matter, but in some browsers does. -007 tests this aspect specifically. */
:root { overflow: hidden; }
-div {
+#ortho {
writing-mode: vertical-rl;
font-family: monospace;
font-size: 20px;
@@ -38,19 +38,22 @@ span {
left: 0; top: 0;
}
-section {
+#scroller {
overflow: hidden;
- writing-mode: vertical-rl;
+ writing-mode: vertical-lr;
height: 40vh;
min-height: 120vh;
}
-section > section {
+#parent {
writing-mode: horizontal-tb;
+ width: 8em; /* avoid triggering intrinsic sizing bugs */
}
</style>
<p>Test passes if there is a <strong>green rectangle</strong> below and <strong>no red</strong>.
-<section>
-<div><aside id="red">0</aside><aside class="spacer"></aside><aside class="spacer"></aside><aside class="spacer"></aside><aside class="spacer"></aside><aside class="spacer"></aside><aside class="spacer"></aside><aside class="spacer"></aside><aside class="spacer"></aside><aside class="spacer"></aside><aside class="spacer"></aside> <span>0</span></div>
-</section>
+<div id=scroller>
+ <div id=parent>
+ <div id=ortho><aside id="red">0</aside><aside class="spacer"></aside><aside class="spacer"></aside><aside class="spacer"></aside><aside class="spacer"></aside><aside class="spacer"></aside><aside class="spacer"></aside><aside class="spacer"></aside><aside class="spacer"></aside><aside class="spacer"></aside><aside class="spacer"></aside> <span>0</span></div>
+ </div>
+</div>
diff --git a/tests/wpt/web-platform-tests/docs/reviewing-tests/index.md b/tests/wpt/web-platform-tests/docs/reviewing-tests/index.md
index 2f6ee822fcc..e313f84596d 100644
--- a/tests/wpt/web-platform-tests/docs/reviewing-tests/index.md
+++ b/tests/wpt/web-platform-tests/docs/reviewing-tests/index.md
@@ -46,10 +46,10 @@ collaborator before it can be merged.
## Notifications
-META.yml files are used only to indicate who should be notified of pull
+META.yml files are used to indicate who should be notified of pull
requests. If you are interested in receiving notifications of proposed
-changes to tests in a given directory, feel free to add yourself to the
-META.yml file.
+changes to tests in a given directory, feel free to add your GitHub account
+username to the `suggested_reviewers` list in the META.yml file.
## Finding contributions to review
diff --git a/tests/wpt/web-platform-tests/docs/test-suite-design.md b/tests/wpt/web-platform-tests/docs/test-suite-design.md
index adc6810f38f..6a104e2f1d4 100644
--- a/tests/wpt/web-platform-tests/docs/test-suite-design.md
+++ b/tests/wpt/web-platform-tests/docs/test-suite-design.md
@@ -32,6 +32,13 @@ For example, tests in HTML for ["The History
interface"](https://html.spec.whatwg.org/multipage/history.html#the-history-interface)
are located in `html/browsers/history/the-history-interface/`.
+Many directories also include a file named `META.yml`. This file may define any
+of the following properties:
+
+- `spec` - a link to the specification covered by the tests in the directory
+- `suggested_reviewers` - a list of GitHub account username belonging to
+ people who are notified when pull requests modify files in the directory
+
Various resources that tests depend on are in `common`, `images`, `fonts`,
`media`, and `resources`.
diff --git a/tests/wpt/web-platform-tests/dom/idlharness.window.js b/tests/wpt/web-platform-tests/dom/idlharness.window.js
index 7d87aeaa337..24b56cf05ad 100644
--- a/tests/wpt/web-platform-tests/dom/idlharness.window.js
+++ b/tests/wpt/web-platform-tests/dom/idlharness.window.js
@@ -42,6 +42,11 @@ idl_test(
NodeList: ['document.querySelectorAll("script")'],
HTMLCollection: ['document.body.children'],
DOMTokenList: ['document.body.classList'],
+ XPathEvaluator: ['new XPathEvaluator()'],
+ XPathExpression: ['document.createExpression("//*")'],
+ // Skipped due to https://github.com/web-platform-tests/wpt/issues/18827:
+ // XPathNSResolver: ['document.createNSResolver(document.body)'],
+ XPathResult: ['document.evaluate("//*", document.body)'],
});
}
);
diff --git a/tests/wpt/web-platform-tests/domxpath/README.md b/tests/wpt/web-platform-tests/domxpath/README.md
new file mode 100644
index 00000000000..918997b1646
--- /dev/null
+++ b/tests/wpt/web-platform-tests/domxpath/README.md
@@ -0,0 +1,9 @@
+# XPath
+
+This directory contains tests for [XPath](https://www.w3.org/TR/DOM-Level-3-XPath/).
+
+See [whatwg/dom#67](https://github.com/whatwg/dom/issues/67) for getting XPath
+better specified.
+
+Because the XPath interfaces are defined in the DOM Standard, the idlharness.js
+tests are in [/dom]([/dom) instead of here.
diff --git a/tests/wpt/web-platform-tests/domxpath/interfaces.tentative.html b/tests/wpt/web-platform-tests/domxpath/interfaces.tentative.html
deleted file mode 100644
index 9036ad834a7..00000000000
--- a/tests/wpt/web-platform-tests/domxpath/interfaces.tentative.html
+++ /dev/null
@@ -1,93 +0,0 @@
-<!doctype html>
-<title>XPath tests</title>
-<!-- This is a tentative test because there's no real spec for XPath IDL.
- The closest thing is: -->
-<link rel="help" href="https://wiki.whatwg.org/wiki/DOM_XPath">
-<script src='/resources/testharness.js'></script>
-<script src='/resources/testharnessreport.js'></script>
-<script src='/resources/WebIDLParser.js'></script>
-<script src='/resources/idlharness.js'></script>
-<script type='text/plain'>
-[Exposed=Window]
-interface XPathResult {
- const unsigned short ANY_TYPE = 0;
- const unsigned short NUMBER_TYPE = 1;
- const unsigned short STRING_TYPE = 2;
- const unsigned short BOOLEAN_TYPE = 3;
- const unsigned short UNORDERED_NODE_ITERATOR_TYPE = 4;
- const unsigned short ORDERED_NODE_ITERATOR_TYPE = 5;
- const unsigned short UNORDERED_NODE_SNAPSHOT_TYPE = 6;
- const unsigned short ORDERED_NODE_SNAPSHOT_TYPE = 7;
- const unsigned short ANY_UNORDERED_NODE_TYPE = 8;
- const unsigned short FIRST_ORDERED_NODE_TYPE = 9;
-
- readonly attribute unsigned short resultType;
- readonly attribute unrestricted double numberValue;
- // Maybe "DOMString?".
- readonly attribute DOMString stringValue;
- readonly attribute boolean booleanValue;
- readonly attribute Node? singleNodeValue;
- readonly attribute boolean invalidIteratorState;
- readonly attribute unsigned long snapshotLength;
- Node? iterateNext();
- Node? snapshotItem(unsigned long index);
-};
-
-[Exposed=Window]
-interface XPathExpression {
- XPathResult evaluate(Node contextNode,
- optional unsigned short type,
- optional XPathResult? result);
-};
-
-callback interface XPathNSResolver {
- DOMString? lookupNamespaceURI(DOMString? prefix);
-};
-
-interface mixin XPathEvaluatorBase {
- [NewObject] XPathExpression createExpression(DOMString expression,
- optional XPathNSResolver? resolver);
- XPathNSResolver createNSResolver(Node nodeResolver);
- XPathResult evaluate(DOMString expression,
- Node contextNode,
- optional XPathNSResolver? resolver,
- optional unsigned short type,
- optional XPathResult? result);
-};
-
-[Exposed=Window, Constructor]
-interface XPathEvaluator {};
-
-XPathEvaluator includes XPathEvaluatorBase;
-</script>
-<script type='text/plain' class='untested'>
-interface Document {};
-Document includes XPathEvaluatorBase;
-</script>
-<script>
-"use strict";
-var evaluator = document;
-var resolver = function() {};
-var resolver2 = document.createNSResolver(document.documentElement);
-var expression = document.createExpression("//*", resolver);
-var result = document.evaluate("//*", document.documentElement, resolver, 0, null);
-
-var idlArray;
-setup(function() {
- idlArray = new IdlArray();
- [].forEach.call(document.querySelectorAll("script[type=text\\/plain]"), function(node) {
- if (node.className == "untested") {
- idlArray.add_untested_idls(node.textContent);
- } else {
- idlArray.add_idls(node.textContent);
- }
- });
- idlArray.add_objects({
- Document: ["document"],
- XPathExpression: ["expression"],
- XPathResolver: ["resolver", "resolver2"],
- XPathResult: ["result"]
- });
-});
-idlArray.test();
-</script>
diff --git a/tests/wpt/web-platform-tests/feature-policy/experimental-features/intrinsicsize-with-unsized-media.tentative.https.sub.html b/tests/wpt/web-platform-tests/feature-policy/experimental-features/intrinsicsize-with-unsized-media.tentative.https.sub.html
deleted file mode 100644
index 9d4757f81eb..00000000000
--- a/tests/wpt/web-platform-tests/feature-policy/experimental-features/intrinsicsize-with-unsized-media.tentative.https.sub.html
+++ /dev/null
@@ -1,122 +0,0 @@
-<!DOCTYPE html>
-<body>
-<script src="/resources/testharness.js"></script>
-<script src="/resources/testharnessreport.js"></script>
-<script>
-'use strict';
-
-const srcs = [
- "/feature-policy/experimental-features/resources/image.svg",
- "/feature-policy/experimental-features/resources/image.jpg",
- "/feature-policy/experimental-features/resources/image.png",
-];
-
-// Set new attribute, and wait til the media element is repainted.
-function updateAttribute(e, attribute, value) {
- return new Promise(resolve => {
- requestAnimationFrame(() => requestAnimationFrame(() => resolve()));
- e.setAttribute(attribute, value);
- });
-}
-
-// Test intrinsicSize attribute with image element.
-for (var src of srcs) {
- promise_test(async() => {
- var img = document.createElement('IMG');
- document.body.appendChild(img);
- img.src = src;
- await new Promise(resolve =>
- img.addEventListener('load', () => resolve(), {once: true}));
- assert_equals(img.width, 300, 'width');
- assert_equals(img.height, 150, 'height');
- assert_equals(img.naturalWidth, 300, 'naturalWidth');
- assert_equals(img.naturalHeight, 150, 'naturalHeight');
-
- await updateAttribute(img, 'width', '800');
- assert_equals(img.width, 800, 'width');
- assert_equals(img.height, 400, 'height');
- assert_equals(img.naturalWidth, 300, 'naturalWidth');
- assert_equals(img.naturalHeight, 150, 'naturalHeight');
-
- await updateAttribute(img, 'intrinsicSize', '400 x 500');
- assert_equals(img.width, 800, 'width');
- assert_equals(img.height, 1000, 'height');
- assert_equals(img.naturalWidth, 400, 'naturalWidth');
- assert_equals(img.naturalHeight, 500, 'naturalHeight');
-
- await updateAttribute(img, 'style', 'height:800px;');
- assert_equals(img.width, 800, 'width');
- assert_equals(img.height, 800, 'height');
- assert_equals(img.naturalWidth, 400, 'naturalWidth');
- assert_equals(img.naturalHeight, 500, 'naturalHeight');
-
- await updateAttribute(img, 'width', '');
- assert_equals(img.width, 640, 'width');
- assert_equals(img.height, 800, 'height');
- assert_equals(img.naturalWidth, 400, 'naturalWidth');
- assert_equals(img.naturalHeight, 500, 'naturalHeight');
-
- await updateAttribute(img, 'intrinsicSize', '');
- assert_equals(img.width, 1600, 'width');
- assert_equals(img.height, 800, 'height');
- assert_equals(img.naturalWidth, 300, 'naturalWidth');
- assert_equals(img.naturalHeight, 150, 'naturalHeight');
-
- await updateAttribute(img, 'style', '');
- assert_equals(img.width, 300, 'width');
- assert_equals(img.height, 150, 'height');
- assert_equals(img.naturalWidth, 300, 'naturalWidth');
- assert_equals(img.naturalHeight, 150, 'naturalHeight');
- }, 'Test image with src=' + src);
-}
-
-// Test intrinsicSize attribute with video element.
-promise_test(async() => {
- var video = document.createElement('video');
- document.body.appendChild(video);
- video.src = "/feature-policy/experimental-features/resources/video.ogv";
- await new Promise(resolve =>
- video.addEventListener('canplaythrough', () => resolve(), {once: true}));
- assert_equals(video.getBoundingClientRect().width, 300, 'width');
- assert_equals(video.getBoundingClientRect().height, 150, 'height');
- assert_equals(video.videoWidth, 300, 'videoWidth');
- assert_equals(video.videoHeight, 150, 'videoHeight');
-
- await updateAttribute(video, 'width', '800');
- assert_equals(video.getBoundingClientRect().width, 800, 'width');
- assert_equals(video.getBoundingClientRect().height, 400, 'height');
- assert_equals(video.videoWidth, 300, 'videoWidth');
- assert_equals(video.videoHeight, 150, 'videoHeight');
-
- await updateAttribute(video, 'intrinsicSize', '400 x 500');
- assert_equals(video.getBoundingClientRect().width, 800, 'width');
- assert_equals(video.getBoundingClientRect().height, 1000, 'width');
- assert_equals(video.videoWidth, 400, 'videoWidth');
- assert_equals(video.videoHeight, 500, 'videoHeight');
-
- await updateAttribute(video, 'style', 'height:800px;');
- assert_equals(video.getBoundingClientRect().width, 800, 'width');
- assert_equals(video.getBoundingClientRect().height, 800, 'height');
- assert_equals(video.videoWidth, 400, 'videoWidth');
- assert_equals(video.videoHeight, 500, 'videoHeight');
-
- await updateAttribute(video, 'width', '');
- assert_equals(video.getBoundingClientRect().width, 640, 'width');
- assert_equals(video.getBoundingClientRect().height, 800, 'height');
- assert_equals(video.videoWidth, 400, 'videoWidth');
- assert_equals(video.videoHeight, 500, 'videoHeight');
-
- await updateAttribute(video, 'intrinsicSize', '');
- assert_equals(video.getBoundingClientRect().width, 1600, 'width');
- assert_equals(video.getBoundingClientRect().height, 800, 'height');
- assert_equals(video.videoWidth, 300, 'videoWidth');
- assert_equals(video.videoHeight, 150, 'videoHeight');
-
- await updateAttribute(video, 'style', '');
- assert_equals(video.getBoundingClientRect().width, 300, 'width');
- assert_equals(video.getBoundingClientRect().height, 150, 'height');
- assert_equals(video.videoWidth, 300, 'videoWidth');
- assert_equals(video.videoHeight, 150, 'videoHeight');
-}, 'Test video');
-</script>
-</body>
diff --git a/tests/wpt/web-platform-tests/feature-policy/experimental-features/intrinsicsize-with-unsized-media.tentative.https.sub.html.headers b/tests/wpt/web-platform-tests/feature-policy/experimental-features/intrinsicsize-with-unsized-media.tentative.https.sub.html.headers
deleted file mode 100644
index db2dcbc1929..00000000000
--- a/tests/wpt/web-platform-tests/feature-policy/experimental-features/intrinsicsize-with-unsized-media.tentative.https.sub.html.headers
+++ /dev/null
@@ -1 +0,0 @@
-Feature-Policy: unsized-media 'none'
diff --git a/tests/wpt/web-platform-tests/fetch/sec-metadata/redirect/multiple-redirect-https-downgrade-upgrade.tentative.sub.html b/tests/wpt/web-platform-tests/fetch/sec-metadata/redirect/multiple-redirect-https-downgrade-upgrade.tentative.sub.html
index cede6712264..dc6d2d0ec1f 100644
--- a/tests/wpt/web-platform-tests/fetch/sec-metadata/redirect/multiple-redirect-https-downgrade-upgrade.tentative.sub.html
+++ b/tests/wpt/web-platform-tests/fetch/sec-metadata/redirect/multiple-redirect-https-downgrade-upgrade.tentative.sub.html
@@ -38,8 +38,8 @@
}, "Https downgrade-upgrade font => No headers");
});
- promise_test(() =>
- requestViaImage(secureRedirectURL + encodeURIComponent(insecureRedirectURL + encodeURIComponent("https://{{host}}:{{ports[https][0]}}/common/security-features/subresource/image.py")))
+ promise_test(() => {
+ return requestViaImage(secureRedirectURL + encodeURIComponent(insecureRedirectURL + encodeURIComponent("https://{{host}}:{{ports[https][0]}}/common/security-features/subresource/image.py")))
.then(result => {
headers = result.headers;
got = {
@@ -56,7 +56,8 @@
"user": undefined,
"mode": undefined,
});
- }), "Https downgrade-upgrade image => No headers");
+ });
+ }, "Https downgrade-upgrade image => No headers");
</script>
<script src="https://{{host}}:{{ports[https][0]}}/fetch/api/resources/redirect.py?location=http%3A%2F%2F{{host}}%3A{{ports[http][0]}}%2Ffetch%2Fapi%2Fresources%2Fredirect.py%3Flocation%3Dhttps%253A%252F%252F{{host}}%253A{{ports[https][0]}}%252Ffetch%252Fsec-metadata%252Fresources%252Fecho-as-script.py"></script>
<script>
diff --git a/tests/wpt/web-platform-tests/fetch/sec-metadata/redirect/redirect-http-upgrade.tentative.sub.html b/tests/wpt/web-platform-tests/fetch/sec-metadata/redirect/redirect-http-upgrade.tentative.sub.html
index 4f173d9808a..bfb7ea73e80 100644
--- a/tests/wpt/web-platform-tests/fetch/sec-metadata/redirect/redirect-http-upgrade.tentative.sub.html
+++ b/tests/wpt/web-platform-tests/fetch/sec-metadata/redirect/redirect-http-upgrade.tentative.sub.html
@@ -37,8 +37,8 @@
}, "Http upgrade font => No headers");
});
- promise_test(() =>
- requestViaImage(insecureRedirectURL + encodeURIComponent("https://{{host}}:{{ports[https][0]}}/common/security-features/subresource/image.py"))
+ promise_test(() => {
+ return requestViaImage(insecureRedirectURL + encodeURIComponent("https://{{host}}:{{ports[https][0]}}/common/security-features/subresource/image.py"))
.then(result => {
headers = result.headers;
got = {
@@ -55,7 +55,8 @@
"user": undefined,
"mode": undefined,
});
- }), "Http upgrade image => No headers");
+ });
+ }, "Http upgrade image => No headers");
</script>
<script src="http://{{host}}:{{ports[http][0]}}/fetch/api/resources/redirect.py?location=https%3A%2F%2F{{host}}%3A{{ports[https][0]}}%2Ffetch%2Fsec-metadata%2Fresources%2Fecho-as-script.py"></script>
<script>
diff --git a/tests/wpt/web-platform-tests/fetch/sec-metadata/redirect/redirect-https-downgrade.tentative.sub.html b/tests/wpt/web-platform-tests/fetch/sec-metadata/redirect/redirect-https-downgrade.tentative.sub.html
index 817843828c1..8972bd0b646 100644
--- a/tests/wpt/web-platform-tests/fetch/sec-metadata/redirect/redirect-https-downgrade.tentative.sub.html
+++ b/tests/wpt/web-platform-tests/fetch/sec-metadata/redirect/redirect-https-downgrade.tentative.sub.html
@@ -38,7 +38,7 @@
});
promise_test(() =>
- requestViaImage(secureRedirectURL + encodeURIComponent("http://{{host}}:{{ports[http][0]}}/common/security-features/subresource/image.py"))
+ return requestViaImage(secureRedirectURL + encodeURIComponent("http://{{host}}:{{ports[http][0]}}/common/security-features/subresource/image.py"))
.then(result => {
headers = result.headers;
got = {
diff --git a/tests/wpt/web-platform-tests/fetch/sec-metadata/resources/redirectTestHelper.sub.js b/tests/wpt/web-platform-tests/fetch/sec-metadata/resources/redirectTestHelper.sub.js
index ad78702269d..c28af6476aa 100644
--- a/tests/wpt/web-platform-tests/fetch/sec-metadata/resources/redirectTestHelper.sub.js
+++ b/tests/wpt/web-platform-tests/fetch/sec-metadata/resources/redirectTestHelper.sub.js
@@ -78,7 +78,7 @@ function RunCommonRedirectTests(testNamePrefix, urlHelperMethod, expectedResults
e.onload = e => {
fetch("/fetch/sec-metadata/resources/record-header.py?retrieve=true&file=" + key)
.then(response => response.text())
- .then(text => assert_header_equals(text, expectedResults))
+ .then(t.step_func(text => assert_header_equals(text, expectedResults)))
.then(_ => resolve())
.catch(e => reject(e));
};
@@ -102,7 +102,7 @@ function RunCommonRedirectTests(testNamePrefix, urlHelperMethod, expectedResults
e.onload = e => {
fetch("/fetch/sec-metadata/resources/record-header.py?retrieve=true&file=" + key)
.then(response => response.text())
- .then(text => assert_header_equals(text, expectedResults))
+ .then(t.step_func(text => assert_header_equals(text, expectedResults)))
.then(_ => resolve())
.catch(e => reject(e));
};
@@ -154,7 +154,7 @@ function RunCommonRedirectTests(testNamePrefix, urlHelperMethod, expectedResults
e.onload = e => {
fetch("/fetch/sec-metadata/resources/record-header.py?retrieve=true&file=" + key)
.then(response => response.text())
- .then(text => assert_header_equals(text, expectedResults))
+ .then(t.step_func(text => assert_header_equals(text, expectedResults)))
.then(_ => resolve())
.catch(e => reject(e));
};
@@ -171,7 +171,7 @@ function RunCommonRedirectTests(testNamePrefix, urlHelperMethod, expectedResults
el.onload = t.step_func(_ => {
fetch("/fetch/sec-metadata/resources/record-header.py?retrieve=true&file=" + key)
.then(response => response.text())
- .then(text => assert_header_equals(text, expectedResults))
+ .then(t.step_func(text => assert_header_equals(text, expectedResults)))
.then(_ => resolve());
});
video.appendChild(el);
diff --git a/tests/wpt/web-platform-tests/html/rendering/non-replaced-elements/form-controls/resets.html b/tests/wpt/web-platform-tests/html/rendering/non-replaced-elements/form-controls/resets.html
index ae4da454014..052adca4c5b 100644
--- a/tests/wpt/web-platform-tests/html/rendering/non-replaced-elements/form-controls/resets.html
+++ b/tests/wpt/web-platform-tests/html/rendering/non-replaced-elements/form-controls/resets.html
@@ -1,5 +1,6 @@
<!doctype html>
<title>default style resets</title>
+<meta name="viewport" content="width=device-width">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<style>
diff --git a/tests/wpt/web-platform-tests/html/semantics/embedded-content/svg/intrinsicsize/intrinsicsize-svg-image-ref.html b/tests/wpt/web-platform-tests/html/semantics/embedded-content/svg/intrinsicsize/intrinsicsize-svg-image-ref.html
deleted file mode 100644
index 41ddd757eca..00000000000
--- a/tests/wpt/web-platform-tests/html/semantics/embedded-content/svg/intrinsicsize/intrinsicsize-svg-image-ref.html
+++ /dev/null
@@ -1,22 +0,0 @@
-<!DOCTYPE html>
-<meta charset="utf-8">
-<body>
-<svg width=200 height=200>
- <image href="/images/background.png" width="32" height="32"/>
-</svg>
-<svg width=200 height=200>
- <image href="/images/background.png" width="300" height="150"/>
-</svg>
-<svg width=400 height=400>
- <image href="/images/background.png" width="300" height="150"/>
-</svg>
-<svg width=200 height=200>
- <image href="/images/background.png" width="300" height="150"/>
-</svg>
-<svg width=200 height=200>
- <image href="/images/background.png" height="50" width="100"/>
-</svg>
-<svg width=200 height=200>
- <image href="/images/background.png" width="100" height="100"/>
-</svg>
-</body>
diff --git a/tests/wpt/web-platform-tests/html/semantics/embedded-content/svg/intrinsicsize/intrinsicsize-svg-image.tentative.html b/tests/wpt/web-platform-tests/html/semantics/embedded-content/svg/intrinsicsize/intrinsicsize-svg-image.tentative.html
deleted file mode 100644
index a0943169d0a..00000000000
--- a/tests/wpt/web-platform-tests/html/semantics/embedded-content/svg/intrinsicsize/intrinsicsize-svg-image.tentative.html
+++ /dev/null
@@ -1,24 +0,0 @@
-<!DOCTYPE html>
-<meta charset="utf-8">
-<link rel="match" href="intrinsicsize-svg-image-ref.html">
-<meta name="assert" content="test">
-<body>
-<svg width=200 height=200>
- <image href="/images/background.png"/>
-</svg>
-<svg width=200 height=200>
- <image href="/images/background.png" intrinsicsize="300x150"/>
-</svg>
-<svg width=400 height=400>
- <image href="/images/background.png" intrinsicsize="300x150"/>
-</svg>
-<svg width=200 height=200>
- <image href="/images/background.png" intrinsicsize="300x150" width="300"/>
-</svg>
-<svg width=200 height=200>
- <image href="/images/background.png" intrinsicsize="300x150" height="50"/>
-</svg>
-<svg width=200 height=200>
- <image href="/images/background.png" intrinsicsize="300x150" width="100" height="100"/>
-</svg>
-</body>
diff --git a/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-img-element/img.complete.html b/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-img-element/img.complete.html
index 42113cdd2ff..dcacf43db2d 100644
--- a/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-img-element/img.complete.html
+++ b/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-img-element/img.complete.html
@@ -12,6 +12,7 @@
<img id="imgTestTag3" style="width: 80px; height:auto;">
<img id="imgTestTag4">
<img id="imgTestTag5">
+<div id="image-container"></div>
<script>
var imageInstance = document.createElement('img');
@@ -27,8 +28,58 @@
}, "img src and srcset omitted");
test(function() {
+ var img = document.createElement("img");
+ assert_true(img.complete);
+ }, "img src and srcset omitted on newly-created image");
+
+ test(function() {
+ var cont = document.getElementById("image-container");
+ this.add_cleanup(() => { cont.innerHTML = "" });
+ var img = document.createElement("img");
+ cont.appendChild(img);
+ assert_true(img.complete);
+ }, "img src and srcset omitted on newly-created-and-inserted image");
+
+ test(function() {
+ var cont = document.getElementById("image-container");
+ this.add_cleanup(() => { cont.innerHTML = "" });
+ cont.innerHTML = "<img>";
+ assert_true(cont.querySelector("img").complete);
+ }, "img src and srcset omitted on newly-created-via-innerHTML image");
+
+ test(function() {
assert_true(document.getElementById("imgTestTag2").complete);
- }, "img src and srcset empty");
+ }, "img src empty and srcset omitted");
+
+ test(function() {
+ var img = document.createElement("img");
+ img.setAttribute("src", "");
+ assert_true(img.complete);
+ }, "img src empty and srcset omitted on newly-created image");
+
+ test(function() {
+ var cont = document.getElementById("image-container");
+ this.add_cleanup(() => { cont.innerHTML = "" });
+ var img = document.createElement("img");
+ img.setAttribute("src", "");
+ cont.appendChild(img);
+ assert_true(img.complete);
+ }, "img src empty and srcset omitted on newly-created-and-inserted image");
+
+ test(function() {
+ var cont = document.getElementById("image-container");
+ this.add_cleanup(() => { cont.innerHTML = "" });
+ cont.innerHTML = "<img src=''>";
+ assert_true(cont.querySelector("img").complete);
+ }, "img src empty and srcset omitted on newly-created-via-innerHTML image");
+
+ test(function() {
+ var img = document.createElement("img");
+ img.src = location.href;
+ assert_false(img.complete, "Should have a load going");
+ img.removeAttribute("src");
+ assert_true(img.complete);
+ }, "img src and srcset omitted on image after it started a load");
// test if set to true after img is completely available
var t = async_test("async src complete test");
@@ -103,4 +154,57 @@
assert_true(img4.complete);
t2.done();
});
+
+ var t3 = async_test("async src removal test");
+ t3.step(function() {
+ var img = document.createElement("img");
+ assert_true(img.complete);
+ img.src = `3.jpg?nocache=${Math.random()}`;
+ assert_false(img.complete);
+ img.onload = this.step_func_done(() => {
+ assert_true(img.complete);
+ img.removeAttribute("src");
+ assert_true(img.complete, "Should be complete, since we removed the src");
+ });
+ });
+
+ var t4 = async_test("async srcset removal test");
+ t4.step(function() {
+ var img = document.createElement("img");
+ assert_true(img.complete);
+ img.srcset = `3.jpg?nocache=${Math.random()} 1x`;
+ assert_false(img.complete);
+ img.onload = this.step_func_done(() => {
+ assert_true(img.complete);
+ img.removeAttribute("srcset");
+ assert_true(img.complete, "Should be complete, since we removed the srcset");
+ });
+ });
+
+ var t5 = async_test("async src available image lookup test");
+ t5.step(function() {
+ var preload = document.createElement("img");
+ var url = `3.jpg?nocache=${Math.random()}`;
+ preload.src = url;
+ preload.onload = this.step_func_done(function() {
+ var img = document.createElement("img");
+ assert_true(img.complete);
+ img.src = url;
+ assert_true(img.complete, "Should be complete because we should hit the available image cache");
+ });
+ });
+
+ var t6 = async_test("async pending request test");
+ t6.step(function() {
+ var img = document.createElement("img");
+ img.src = `3.jpg?nocache=${Math.random()}`;
+ img.onload = this.step_func_done(function() {
+ assert_true(img.complete);
+ img.src = `3.jpg?nocache=${Math.random()}`;
+ // This is not strictly per spec, but that's a spec bug. See
+ // https://github.com/whatwg/html/issues/4884
+ assert_false(img.complete, "Should not be complete because we have started a new load");
+ });
+ });
+
</script>
diff --git a/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-img-element/intrinsicsize/intrinsicsize-with-responsive-images.tentative.html b/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-img-element/intrinsicsize/intrinsicsize-with-responsive-images.tentative.html
deleted file mode 100644
index 739765c0d44..00000000000
--- a/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-img-element/intrinsicsize/intrinsicsize-with-responsive-images.tentative.html
+++ /dev/null
@@ -1,96 +0,0 @@
-<!DOCTYPE html>
-<body>
-<script src="/resources/testharness.js"></script>
-<script src="/resources/testharnessreport.js"></script>
-<script>
-'use strict';
-
-const srcs = [
- "/images/green.svg",
- "/images/green.png",
-];
-
-for (var src of srcs) {
- async_test(t => {
- var img = document.createElement('IMG');
- img.intrinsicSize = '400 x 500';
- var expected_intrinsic_width = 400;
- var expected_intrinsic_height = 500;
- var expected_width = expected_intrinsic_width;
- var expected_height = expected_intrinsic_height;
-
- document.body.appendChild(img);
- img.addEventListener('load', t.step_func(() => {
- assert_equals(img.width, expected_width, 'width');
- assert_equals(img.height, expected_height, 'height');
- assert_equals(img.naturalWidth, expected_intrinsic_width, 'naturalWidth');
- assert_equals(img.naturalHeight, expected_intrinsic_height, 'naturalHeigh');
- t.done();
- }));
- img.srcset = src + ' 3x';
- }, 'Test image ' + src + ' with no specified sizes, width, or height');
-
- async_test(t => {
- var img = document.createElement('IMG');
- img.intrinsicSize = '400 x 500';
- img.width = '800'; /* 2x of intrinsic width */
- var expected_intrinsic_width = 400;
- var expected_intrinsic_height = 500;
- var expected_width = expected_intrinsic_width * 2;
- var expected_height = expected_intrinsic_height * 2;
-
- document.body.appendChild(img);
- img.addEventListener('load', t.step_func(() => {
- assert_equals(img.width, expected_width, 'width');
- assert_equals(img.height, expected_height, 'height');
- assert_equals(img.naturalWidth, expected_intrinsic_width, 'naturalWidth');
- assert_equals(img.naturalHeight, expected_intrinsic_height, 'naturalHeigh');
- t.done();
- }));
- img.srcset = src + ' 3x';
- }, 'Test image ' + src + ' with width = 800, no specified sizes, or height');
-
- async_test(t => {
- var img = document.createElement('IMG');
- img.intrinsicSize = '400 x 500';
- img.width = '800';
- img.style = 'height:800px;';
- var expected_intrinsic_width = 400;
- var expected_intrinsic_height = 500;
- var expected_width = 800;
- var expected_height = 800;
-
- document.body.appendChild(img);
- img.addEventListener('load', t.step_func(() => {
- assert_equals(img.width, expected_width, 'width');
- assert_equals(img.height, expected_height, 'height');
- assert_equals(img.naturalWidth, expected_intrinsic_width, 'naturalWidth');
- assert_equals(img.naturalHeight, expected_intrinsic_height, 'naturalHeigh');
- t.done();
- }));
- img.srcset = src + ' 3x';
- }, 'Test image ' + src + ' with width = 800, height = 800, and no specified sizes');
-}
-
-async_test(t => {
- var img = document.createElement('IMG');
- img.intrinsicSize = '400 x 500';
- img.sizes = '100px';
- var expected_intrinsic_width = 100;
- var expected_intrinsic_height = 125;
- var expected_width = 100;
- var expected_height = 125;
-
- document.body.appendChild(img);
- img.addEventListener('load', t.step_func(() => {
- assert_equals(img.width, expected_width, 'width');
- assert_equals(img.height, expected_height, 'height');
- assert_equals(img.naturalWidth, expected_intrinsic_width, 'naturalWidth');
- assert_equals(img.naturalHeight, expected_intrinsic_height, 'naturalHeigh');
- t.done();
- }));
- img.srcset = '/images/background.png 32w';
-}, 'Test image (32 x 32) with sizes = 100 and srcset descriptor = 32w');
-
-</script>
-</body>
diff --git a/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-img-element/intrinsicsize/intrinsicsize-without-unsized-media.tentative.https.sub.html b/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-img-element/intrinsicsize/intrinsicsize-without-unsized-media.tentative.https.sub.html
deleted file mode 100644
index 4192e567fcc..00000000000
--- a/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-img-element/intrinsicsize/intrinsicsize-without-unsized-media.tentative.https.sub.html
+++ /dev/null
@@ -1,66 +0,0 @@
-<!DOCTYPE html>
-<body>
-<script src="/resources/testharness.js"></script>
-<script src="/resources/testharnessreport.js"></script>
-<script>
-'use strict';
-
-const srcs = [
- "/images/green.svg",
- "/images/green.png",
-];
-
-// Set new attribute, and wait til the media element is repainted.
-function updateAttribute(e, attribute, value) {
- return new Promise(resolve => {
- requestAnimationFrame(() => requestAnimationFrame(() => resolve()));
- e.setAttribute(attribute, value);
- });
-}
-
-for (var src of srcs) {
- promise_test(async() => {
- var img = document.createElement('IMG');
- document.body.appendChild(img);
- img.src = src;
- await new Promise(resolve =>
- img.addEventListener('load', () => resolve(), {once: true}));
- await updateAttribute(img, 'intrinsicSize', '400 x 500');
- assert_equals(img.width, 400, 'width');
- assert_equals(img.height, 500, 'height');
- assert_equals(img.naturalWidth, 400, 'naturalWidth');
- assert_equals(img.naturalHeight, 500, 'naturalHeight');
-
- await updateAttribute(img, 'width', '800');
- assert_equals(img.width, 800, 'width');
- assert_equals(img.height, 1000, 'height');
- assert_equals(img.naturalWidth, 400, 'naturalWidth');
- assert_equals(img.naturalHeight, 500, 'naturalHeight');
-
- await updateAttribute(img, 'style', 'height:800px;');
- assert_equals(img.width, 800, 'width');
- assert_equals(img.height, 800, 'height');
- assert_equals(img.naturalWidth, 400, 'naturalWidth');
- assert_equals(img.naturalHeight, 500, 'naturalHeight');
-
- await updateAttribute(img, 'width', '');
- assert_equals(img.width, 640, 'width');
- assert_equals(img.height, 800, 'height');
- assert_equals(img.naturalWidth, 400, 'naturalWidth');
- assert_equals(img.naturalHeight, 500, 'naturalHeight');
-
- await updateAttribute(img, 'style', 'height:800px; writing-mode: vertical-rl;');
- assert_equals(img.width, 640, 'width');
- assert_equals(img.height, 800, 'height');
- assert_equals(img.naturalWidth, 400, 'naturalWidth');
- assert_equals(img.naturalHeight, 500, 'naturalHeight');
-
- await updateAttribute(img, 'style', 'height:800px; writing-mode: horizontal-tb;');
- assert_equals(img.width, 640, 'width');
- assert_equals(img.height, 800, 'height');
- assert_equals(img.naturalWidth, 400, 'naturalWidth');
- assert_equals(img.naturalHeight, 500, 'naturalHeight');
- }, 'Test intrinsicsize for html image element, src=' + src);
-}
-</script>
-</body>
diff --git a/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-img-element/intrinsicsize/intrinsicsize-without-unsized-media.tentative.https.sub.html.headers b/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-img-element/intrinsicsize/intrinsicsize-without-unsized-media.tentative.https.sub.html.headers
deleted file mode 100644
index 4fbf3f5addd..00000000000
--- a/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-img-element/intrinsicsize/intrinsicsize-without-unsized-media.tentative.https.sub.html.headers
+++ /dev/null
@@ -1 +0,0 @@
-Feature-Policy: unsized-media *
diff --git a/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-video-element/intrinsicsize/intrinsicsize-without-unsized-media.tentative.https.sub.html b/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-video-element/intrinsicsize/intrinsicsize-without-unsized-media.tentative.https.sub.html
deleted file mode 100644
index d749d5576e6..00000000000
--- a/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-video-element/intrinsicsize/intrinsicsize-without-unsized-media.tentative.https.sub.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<body>
-<script src="/resources/testharness.js"></script>
-<script src="/resources/testharnessreport.js"></script>
-<script>
-'use strict';
-
-promise_test(async() => {
- var video = document.createElement('video');
- document.body.appendChild(video);
- video.src = "/images/pattern.ogv";
- await new Promise(resolve =>
- video.addEventListener('canplaythrough', () => resolve(), {once: true}));
- video.intrinsicSize = '400 x 500';
- assert_equals(video.getBoundingClientRect().width, 400, 'width');
- assert_equals(video.getBoundingClientRect().height, 500, 'height');
- assert_equals(video.videoWidth, 400, 'naturalWidth');
- assert_equals(video.videoHeight, 500, 'naturalHeight');
-
- video.width = '800';
- assert_equals(video.getBoundingClientRect().width, 800, 'width');
- assert_equals(video.getBoundingClientRect().height, 1000, 'height');
- assert_equals(video.videoWidth, 400, 'naturalWidth');
- assert_equals(video.videoHeight, 500, 'naturalHeight');
-
- video.style = 'height:800px;';
- assert_equals(video.getBoundingClientRect().width, 800, 'width');
- assert_equals(video.getBoundingClientRect().height, 800, 'height');
- assert_equals(video.videoWidth, 400, 'naturalWidth');
- assert_equals(video.videoHeight, 500, 'naturalHeight');
-
- video.removeAttribute('width');
- assert_equals(video.getBoundingClientRect().width, 640, 'width');
- assert_equals(video.getBoundingClientRect().height, 800, 'height');
- assert_equals(video.videoWidth, 400, 'naturalWidth');
- assert_equals(video.videoHeight, 500, 'naturalHeight');
-}, 'Test intrinsicsize for html video element');
-</script>
-</body>
diff --git a/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-video-element/intrinsicsize/intrinsicsize-without-unsized-media.tentative.https.sub.html.headers b/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-video-element/intrinsicsize/intrinsicsize-without-unsized-media.tentative.https.sub.html.headers
deleted file mode 100644
index 4fbf3f5addd..00000000000
--- a/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-video-element/intrinsicsize/intrinsicsize-without-unsized-media.tentative.https.sub.html.headers
+++ /dev/null
@@ -1 +0,0 @@
-Feature-Policy: unsized-media *
diff --git a/tests/wpt/web-platform-tests/html/semantics/forms/autofocus/autofocus-on-stable-document.html b/tests/wpt/web-platform-tests/html/semantics/forms/autofocus/autofocus-on-stable-document.html
new file mode 100644
index 00000000000..47e3e3fd0ab
--- /dev/null
+++ b/tests/wpt/web-platform-tests/html/semantics/forms/autofocus/autofocus-on-stable-document.html
@@ -0,0 +1,21 @@
+<!DOCTYPE html>
+<script src="/resources/testharness.js"></script>
+<script src="/resources/testharnessreport.js"></script>
+<script src="resources/utils.js"></script>
+
+<body>
+<script>
+'use strict';
+
+promise_test(async t => {
+ await waitForLoad(window);
+ await timeOut(t, 1000);
+ let element = document.createElement('input');
+ element.autofocus = true;
+ document.body.appendChild(element);
+ await waitUntilStableAutofocusState();
+ assert_equals(document.activeElement, element);
+}, 'Autofocus should work if an element with autofocus is inserted into a ' +
+ 'document which was loaded some time ago.');
+</script>
+</body>
diff --git a/tests/wpt/web-platform-tests/html/semantics/forms/autofocus/first-reconnected.html b/tests/wpt/web-platform-tests/html/semantics/forms/autofocus/first-reconnected.html
new file mode 100644
index 00000000000..99ee9198d1b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/html/semantics/forms/autofocus/first-reconnected.html
@@ -0,0 +1,22 @@
+<!DOCTYPE html>
+<meta charset="utf-8">
+<script src="/resources/testharness.js"></script>
+<script src="/resources/testharnessreport.js"></script>
+<script src="resources/utils.js"></script>
+
+<input autofocus id="i1">
+<input autofocus id="i2">
+<script>
+"use strict";
+
+promise_test(async () => {
+ const input1 = document.querySelector("#i1");
+ const input2 = document.querySelector("#i2");
+ input1.remove();
+ input2.parentNode.insertBefore(input1, input2);
+
+ await waitUntilStableAutofocusState();
+ assert_equals(document.activeElement, input2);
+}, 'The second autofocus element wins if the first autofocus element was ' +
+ 'disconnected and reconnected before flushing the autofocus candidates.');
+</script>
diff --git a/tests/wpt/web-platform-tests/html/semantics/forms/autofocus/first-when-later-but-before.html b/tests/wpt/web-platform-tests/html/semantics/forms/autofocus/first-when-later-but-before.html
index 0267f46627f..f361463401b 100644
--- a/tests/wpt/web-platform-tests/html/semantics/forms/autofocus/first-when-later-but-before.html
+++ b/tests/wpt/web-platform-tests/html/semantics/forms/autofocus/first-when-later-but-before.html
@@ -6,22 +6,21 @@
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
+<script src="resources/utils.js"></script>
<input autofocus>
<script>
"use strict";
-const input1 = document.querySelector("input");
+promise_test(async () => {
+ const input1 = document.querySelector("input");
+ const input2 = document.createElement("input");
+ input2.autofocus = true;
+ document.body.prepend(input2);
-const input2 = document.createElement("input");
-input2.autofocus = true;
-document.body.prepend(input2);
-
-step_timeout(() => {
- assert_equals(document.activeElement, input1);
- assert_not_equals(document.activeElement, input2);
-
- done();
-}, 100);
+ await waitUntilStableAutofocusState();
+ assert_equals(document.activeElement, input1);
+ assert_not_equals(document.activeElement, input2);
+}, 'The temporally first autofocus in the document wins, even if an element is inserted later that is previous in the document tree.');
</script>
diff --git a/tests/wpt/web-platform-tests/html/semantics/forms/autofocus/first-when-later.html b/tests/wpt/web-platform-tests/html/semantics/forms/autofocus/first-when-later.html
index 9ced437f4a9..1d64b863a16 100644
--- a/tests/wpt/web-platform-tests/html/semantics/forms/autofocus/first-when-later.html
+++ b/tests/wpt/web-platform-tests/html/semantics/forms/autofocus/first-when-later.html
@@ -6,22 +6,21 @@
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
+<script src="resources/utils.js"></script>
<input autofocus>
<script>
"use strict";
-const input1 = document.querySelector("input");
+promise_test(async () => {
+ const input1 = document.querySelector("input");
+ const input2 = document.createElement("input");
+ input2.autofocus = true;
+ document.body.appendChild(input2);
-const input2 = document.createElement("input");
-input2.autofocus = true;
-document.body.appendChild(input2);
-
-step_timeout(() => {
- assert_equals(document.activeElement, input1);
- assert_not_equals(document.activeElement, input2);
-
- done();
-}, 100);
+ await waitUntilStableAutofocusState();
+ assert_equals(document.activeElement, input1);
+ assert_not_equals(document.activeElement, input2);
+}, 'The first autofocus in the document wins, even if elements are inserted later.');
</script>
diff --git a/tests/wpt/web-platform-tests/html/semantics/forms/autofocus/first.html b/tests/wpt/web-platform-tests/html/semantics/forms/autofocus/first.html
index de56cf74eda..02ebb79a3e9 100644
--- a/tests/wpt/web-platform-tests/html/semantics/forms/autofocus/first.html
+++ b/tests/wpt/web-platform-tests/html/semantics/forms/autofocus/first.html
@@ -6,6 +6,7 @@
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
+<script src="resources/utils.js"></script>
<input autofocus>
<input autofocus>
@@ -13,12 +14,11 @@
<script>
"use strict";
-const [input1, input2] = document.querySelectorAll("input");
+promise_test(async () => {
+ const [input1, input2] = document.querySelectorAll("input");
-step_timeout(() => {
+ await waitUntilStableAutofocusState();
assert_equals(document.activeElement, input1);
assert_not_equals(document.activeElement, input2);
-
- done();
-}, 100);
+}, 'The first autofocus element in the document should win.');
</script>
diff --git a/tests/wpt/web-platform-tests/html/semantics/forms/autofocus/focusable-area-in-top-document.html b/tests/wpt/web-platform-tests/html/semantics/forms/autofocus/focusable-area-in-top-document.html
new file mode 100644
index 00000000000..327040eeeeb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/html/semantics/forms/autofocus/focusable-area-in-top-document.html
@@ -0,0 +1,24 @@
+<!DOCTYPE html>
+<script src="/resources/testharness.js"></script>
+<script src="/resources/testharnessreport.js"></script>
+<script src="resources/utils.js"></script>
+
+<iframe srcdoc="<input><script>document.querySelector('input').focus();</script>"></iframe>
+
+<script>
+'use strict';
+
+promise_test(async () => {
+ await waitForLoad(window);
+ let iframe = document.querySelector('iframe');
+ assert_equals(document.activeElement, iframe, 'Prereq: IFRAME should be focused');
+
+ let input = document.createElement('input');
+ input.autofocus = true;
+ document.body.appendChild(input);
+
+ await waitUntilStableAutofocusState();
+ assert_equals(document.activeElement, iframe, 'activeElement should not be changed');
+ assert_not_equals(document.activeElement, input);
+}, 'If topDocument\'s focused area is not topDocument, autofocus is not processed.');
+</script>
diff --git a/tests/wpt/web-platform-tests/html/semantics/forms/autofocus/no-sandboxed-automatic-features.html b/tests/wpt/web-platform-tests/html/semantics/forms/autofocus/no-sandboxed-automatic-features.html
new file mode 100644
index 00000000000..991373d3363
--- /dev/null
+++ b/tests/wpt/web-platform-tests/html/semantics/forms/autofocus/no-sandboxed-automatic-features.html
@@ -0,0 +1,17 @@
+<!DOCTYPE html>
+<script src="/resources/testharness.js"></script>
+<script src="/resources/testharnessreport.js"></script>
+<script src="resources/utils.js"></script>
+
+<iframe sandbox srcdoc="<input autofocus>"></iframe>
+
+<script>
+'use strict';
+
+promise_test(async () => {
+ await waitForLoad(window);
+ await waitUntilStableAutofocusState();
+ assert_not_equals(document.activeElement, document.querySelector('iframe'));
+}, 'If the sandboxed automatic features browsing context flag is set, ' +
+ 'autofocus in the browsing context should not be handled.');
+</script>
diff --git a/tests/wpt/web-platform-tests/html/semantics/forms/autofocus/queue-non-focusable.html b/tests/wpt/web-platform-tests/html/semantics/forms/autofocus/queue-non-focusable.html
new file mode 100644
index 00000000000..e3b556035d3
--- /dev/null
+++ b/tests/wpt/web-platform-tests/html/semantics/forms/autofocus/queue-non-focusable.html
@@ -0,0 +1,20 @@
+<!DOCTYPE html>
+<script src="/resources/testharness.js"></script>
+<script src="/resources/testharnessreport.js"></script>
+<script src="resources/utils.js"></script>
+
+<textarea autofocus disabled></textarea>
+<select autofocus></select>
+
+<script>
+'use strict';
+
+promise_test(async () => {
+ const [textarea, select] = document.querySelectorAll('[autofocus]');
+ textarea.disabled = false;
+
+ await waitUntilStableAutofocusState();
+ assert_equals(document.activeElement, textarea);
+ assert_not_equals(document.activeElement, select);
+}, 'If the first autofocus element is not focusable, but becomes focusable before a frame, it should be focused.');
+</script>
diff --git a/tests/wpt/web-platform-tests/html/semantics/forms/autofocus/resources/erase-first.css b/tests/wpt/web-platform-tests/html/semantics/forms/autofocus/resources/erase-first.css
new file mode 100644
index 00000000000..bbbcf799393
--- /dev/null
+++ b/tests/wpt/web-platform-tests/html/semantics/forms/autofocus/resources/erase-first.css
@@ -0,0 +1,3 @@
+#first {
+ display: none;
+}
diff --git a/tests/wpt/web-platform-tests/html/semantics/forms/autofocus/resources/frame-with-autofocus-element.html b/tests/wpt/web-platform-tests/html/semantics/forms/autofocus/resources/frame-with-autofocus-element.html
new file mode 100644
index 00000000000..985cba41494
--- /dev/null
+++ b/tests/wpt/web-platform-tests/html/semantics/forms/autofocus/resources/frame-with-autofocus-element.html
@@ -0,0 +1,5 @@
+<!DOCTYPE html>
+<body>
+<div id="anchor1"></div>
+<input autofocus>
+</body>
diff --git a/tests/wpt/web-platform-tests/html/semantics/forms/autofocus/resources/moving-autofocus-to-parent.html b/tests/wpt/web-platform-tests/html/semantics/forms/autofocus/resources/moving-autofocus-to-parent.html
new file mode 100644
index 00000000000..fc6c298a46e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/html/semantics/forms/autofocus/resources/moving-autofocus-to-parent.html
@@ -0,0 +1,10 @@
+<!DOCTYPE html>
+<body>
+<script>
+const input = document.createElement('input');
+input.autofocus = true;
+document.body.appendChild(input);
+input.autofocus = false;
+window.opener.document.body.appendChild(input);
+</script>
+</body>
diff --git a/tests/wpt/web-platform-tests/html/semantics/forms/autofocus/resources/utils.js b/tests/wpt/web-platform-tests/html/semantics/forms/autofocus/resources/utils.js
index f3690a633ff..0eeb5a9f0ad 100644
--- a/tests/wpt/web-platform-tests/html/semantics/forms/autofocus/resources/utils.js
+++ b/tests/wpt/web-platform-tests/html/semantics/forms/autofocus/resources/utils.js
@@ -6,6 +6,19 @@ function waitForEvent(target, type, options) {
});
}
+function waitForAnimationFrame(w) {
+ let targetWindow = w || window;
+ return new Promise((resolve, reject) => {
+ targetWindow.requestAnimationFrame(resolve);
+ });
+}
+
+function waitForEvent(target, type, options) {
+ return new Promise((resolve, reject) => {
+ target.addEventListener(type, resolve, options);
+ });
+}
+
function waitForLoad(target) {
return waitForEvent(target, 'load');
}
@@ -21,7 +34,9 @@ function timeOut(test, ms) {
// function.
// Exception: If the document has script-blocking style sheets, this function
// doesn't work well.
-async function waitUntilStableAutofocusState(test) {
- // TODO: Update this for https://github.com/web-platform-tests/wpt/pull/17929
- await timeOut(test, 100);
+async function waitUntilStableAutofocusState(w) {
+ let targetWindow = w || window;
+ // Awaiting two animation frames is an easy way to determine autofocus state.
+ await waitForAnimationFrame(targetWindow);
+ await waitForAnimationFrame(targetWindow);
}
diff --git a/tests/wpt/web-platform-tests/html/semantics/forms/autofocus/skip-another-top-level-browsing-context.html b/tests/wpt/web-platform-tests/html/semantics/forms/autofocus/skip-another-top-level-browsing-context.html
new file mode 100644
index 00000000000..d392b903f07
--- /dev/null
+++ b/tests/wpt/web-platform-tests/html/semantics/forms/autofocus/skip-another-top-level-browsing-context.html
@@ -0,0 +1,17 @@
+<!DOCTYPE html>
+<script src="/resources/testharness.js"></script>
+<script src="/resources/testharnessreport.js"></script>
+<script src="resources/utils.js"></script>
+<script>
+'use strict';
+
+promise_test(async () => {
+ let w = window.open('resources/moving-autofocus-to-parent.html');
+ await waitForLoad(w);
+ await waitUntilStableAutofocusState(w);
+ assert_equals(w.document.activeElement, w.document.body);
+ assert_equals(document.activeElement, document.body);
+ w.close();
+}, 'Autofocus elements queued in another top-level browsing context\'s ' +
+ 'documents should be skipped.');
+</script>
diff --git a/tests/wpt/web-platform-tests/html/semantics/forms/autofocus/skip-document-with-fragment.html b/tests/wpt/web-platform-tests/html/semantics/forms/autofocus/skip-document-with-fragment.html
new file mode 100644
index 00000000000..a4301e13516
--- /dev/null
+++ b/tests/wpt/web-platform-tests/html/semantics/forms/autofocus/skip-document-with-fragment.html
@@ -0,0 +1,32 @@
+<!DOCTYPE html>
+<script src="/resources/testharness.js"></script>
+<script src="/resources/testharnessreport.js"></script>
+<script src="resources/utils.js"></script>
+
+<iframe src="resources/frame-with-autofocus-element.html#anchor1"></iframe>
+<iframe src="resources/frame-with-autofocus-element.html#non-existent-anchor"></iframe>
+
+<script>
+'use strict';
+
+promise_test(async () => {
+ await waitForLoad(window);
+ await waitUntilStableAutofocusState();
+ assert_equals(document.activeElement, document.body,
+ 'Autofocus elements in iframes should not be focused.');
+
+ let input = document.createElement('input');
+ input.autofocus = true;
+ document.body.appendChild(input);
+ await waitUntilStableAutofocusState();
+ assert_equals(document.activeElement, input);
+}, 'Autofocus elements in iframed documents with URL fragments should be skipped.');
+
+promise_test(async () => {
+ let w = window.open('resources/frame-with-autofocus-element.html#xpointer(//body)');
+ await waitForLoad(w);
+ await waitUntilStableAutofocusState(w);
+ assert_equals(w.document.activeElement, w.document.body);
+ w.close();
+}, 'Autofocus elements in top-level browsing context\'s documents with URI fragments should be skipped.');
+</script>
diff --git a/tests/wpt/web-platform-tests/html/semantics/forms/autofocus/skip-non-focusable.html b/tests/wpt/web-platform-tests/html/semantics/forms/autofocus/skip-non-focusable.html
new file mode 100644
index 00000000000..008371d8e16
--- /dev/null
+++ b/tests/wpt/web-platform-tests/html/semantics/forms/autofocus/skip-non-focusable.html
@@ -0,0 +1,19 @@
+<!DOCTYPE html>
+<script src="/resources/testharness.js"></script>
+<script src="/resources/testharnessreport.js"></script>
+<script src="resources/utils.js"></script>
+
+<textarea autofocus disabled></textarea>
+<select autofocus></select>
+
+<script>
+'use strict';
+
+promise_test(async () => {
+ const [textarea, select] = document.querySelectorAll('[autofocus]');
+
+ await waitUntilStableAutofocusState();
+ assert_not_equals(document.activeElement, textarea);
+ assert_equals(document.activeElement, select);
+}, 'Non-focusable autofocus element is skipped.');
+</script>
diff --git a/tests/wpt/web-platform-tests/html/semantics/forms/autofocus/skip-not-fully-active.html b/tests/wpt/web-platform-tests/html/semantics/forms/autofocus/skip-not-fully-active.html
new file mode 100644
index 00000000000..32008b3019e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/html/semantics/forms/autofocus/skip-not-fully-active.html
@@ -0,0 +1,18 @@
+<!DOCTYPE html>
+<script src="/resources/testharness.js"></script>
+<script src="/resources/testharnessreport.js"></script>
+<script src="resources/utils.js"></script>
+
+<iframe srcdoc="<input autofocus><script>window.frameElement.remove();</script>"></iframe>
+
+<script>
+'use strict';
+
+promise_test(async () => {
+ let iframe = document.querySelector('iframe');
+ let iframeDocument = iframe.contentDocument;
+ await waitForLoad(window);
+ assert_not_equals(document.activeElement, iframe);
+ assert_equals(iframeDocument.activeElement, iframeDocument.body);
+}, 'Autofocus element in not-fully-active document should be skipped.');
+</script>
diff --git a/tests/wpt/web-platform-tests/html/semantics/forms/autofocus/spin-by-blocking-style-sheet.html b/tests/wpt/web-platform-tests/html/semantics/forms/autofocus/spin-by-blocking-style-sheet.html
new file mode 100644
index 00000000000..22a4c3573cc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/html/semantics/forms/autofocus/spin-by-blocking-style-sheet.html
@@ -0,0 +1,17 @@
+<!DOCTYPE html>
+<script src="/resources/testharness.js"></script>
+<script src="/resources/testharnessreport.js"></script>
+<script src="resources/utils.js"></script>
+<link rel="stylesheet" href="resources/erase-first.css?pipe=trickle(d1)">
+
+<input id="first" autofocus>
+<input id="second" autofocus>
+
+<script>
+'use strict';
+
+promise_test(async () => {
+ await waitForEvent(document.body, 'focus', {capture:true});
+ assert_equals(document.activeElement.id, 'second');
+}, 'Script-blocking style sheet should pause flushing autofocus candidates.');
+</script>
diff --git a/tests/wpt/web-platform-tests/html/semantics/forms/autofocus/supported-elements.html b/tests/wpt/web-platform-tests/html/semantics/forms/autofocus/supported-elements.html
index cbd21010ffe..398577e7d51 100644
--- a/tests/wpt/web-platform-tests/html/semantics/forms/autofocus/supported-elements.html
+++ b/tests/wpt/web-platform-tests/html/semantics/forms/autofocus/supported-elements.html
@@ -11,7 +11,7 @@ promise_test(async t => {
await waitForLoad(w);
t.add_cleanup(() => { w.close(); });
w.document.body.innerHTML = '<div contenteditable=true autofocus></div>';
- await waitUntilStableAutofocusState(t);
+ await waitUntilStableAutofocusState(w);
assert_equals(w.document.activeElement.tagName, 'DIV');
}, 'Contenteditable element should support autofocus');
@@ -20,7 +20,7 @@ promise_test(async t => {
await waitForLoad(w);
t.add_cleanup(() => { w.close(); });
w.document.body.innerHTML = '<span tabindex=0></span>';
- await waitUntilStableAutofocusState(t);
+ await waitUntilStableAutofocusState(w);
assert_equals(w.document.activeElement.tagName, 'SPAN');
}, 'Element with tabindex should support autofocus');
@@ -31,7 +31,7 @@ promise_test(async t => {
let element = w.document.createElementNS('uri1', 'prefix:local');
element.setAttribute('autofocus', '');
w.document.body.appendChild(element);
- await waitUntilStableAutofocusState(t);
+ await waitUntilStableAutofocusState(w);
assert_equals(w.document.activeElement.tagName, 'BODY');
}, 'Non-HTMLElement should not support autofocus');
</script>
diff --git a/tests/wpt/web-platform-tests/html/semantics/forms/autofocus/update-the-rendering.html b/tests/wpt/web-platform-tests/html/semantics/forms/autofocus/update-the-rendering.html
new file mode 100644
index 00000000000..afaf0926f5b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/html/semantics/forms/autofocus/update-the-rendering.html
@@ -0,0 +1,41 @@
+<!DOCTYPE html>
+<script src="/resources/testharness.js"></script>
+<script src="/resources/testharnessreport.js"></script>
+<link rel="help" href="https://html.spec.whatwg.org/C/#update-the-rendering">
+
+<body>
+<script>
+'use strict';
+
+async_test(t => {
+ t.events = [];
+
+ let iframe = document.createElement('iframe');
+ iframe.addEventListener('load', t.step_func(() => {
+ let w = iframe.contentWindow;
+ w.requestAnimationFrame(t.step_func(() => {
+ t.events.push('animationFrame');
+ w.requestAnimationFrame(t.step_func(() => {
+ t.events.push('animationFrame-should-not-be-recorded');
+ }));
+ }));
+ let element = w.document.createElement('input');
+ element.autofocus = true;
+ element.addEventListener('focus', t.step_func(() => {
+ t.events.push('autofocus');
+ iframe.style.width = '71px';
+ }));
+
+ w.addEventListener('resize', t.step_func_done(() => {
+ t.events.push('resize');
+ assert_array_equals(t.events, ['animationFrame', 'autofocus', 'resize']);
+ }));
+
+ w.document.body.appendChild(element);
+ }));
+ document.body.appendChild(iframe);
+}, '"Flush autofocus candidates" should be happen after the first animation ' +
+ 'frame callbacks, and before a resize event in the next iteration of ' +
+ 'window event loop.');
+</script>
+</body>
diff --git a/tests/wpt/web-platform-tests/html/semantics/forms/constraints/form-validation-validity-rangeOverflow.html b/tests/wpt/web-platform-tests/html/semantics/forms/constraints/form-validation-validity-rangeOverflow.html
index ca423ef9ed7..fedf2ea4e4f 100644
--- a/tests/wpt/web-platform-tests/html/semantics/forms/constraints/form-validation-validity-rangeOverflow.html
+++ b/tests/wpt/web-platform-tests/html/semantics/forms/constraints/form-validation-validity-rangeOverflow.html
@@ -106,7 +106,8 @@
{conditions: {max: "5", value: "1abc"}, expected: false, name: "[target] The value is not a number"},
{conditions: {max: "5", value: "6"}, expected: true, name: "[target] The value is greater than max(integer)"},
{conditions: {max: "-5.5", value: "-5.4"}, expected: true, name: "[target] The value is greater than max(floating number)"},
- {conditions: {max: "-5e-1", value: "5e+2"}, expected: true, name: "[target] The value is greater than max(scientific notation)"}
+ {conditions: {max: "-1", value: "-.8"}, expected: true, name: "[target] The value is greater than max(special floating number)"},
+ {conditions: {max: "-5e-1", value: "5e+2"}, expected: true, name: "[target] The value is greater than max(scientific notation)"},
]
}
];
diff --git a/tests/wpt/web-platform-tests/html/semantics/forms/constraints/form-validation-validity-rangeUnderflow.html b/tests/wpt/web-platform-tests/html/semantics/forms/constraints/form-validation-validity-rangeUnderflow.html
index d6bf86060b1..8ac3aae1279 100644
--- a/tests/wpt/web-platform-tests/html/semantics/forms/constraints/form-validation-validity-rangeUnderflow.html
+++ b/tests/wpt/web-platform-tests/html/semantics/forms/constraints/form-validation-validity-rangeUnderflow.html
@@ -104,6 +104,7 @@
{conditions: {min: "5", value: "6abc"}, expected: false, name: "[target] The value is not a number"},
{conditions: {min: "6", value: "5"}, expected: true, name: "[target] The value is less than min(integer)"},
{conditions: {min: "-5.4", value: "-5.5"}, expected: true, name: "[target] The value is less than min(floating number)"},
+ {conditions: {min: "1", value: "-.8"}, expected: true, name: "[target] The value is less than min(special floating number)"},
{conditions: {min: "5e+2", value: "-5e-1"}, expected: true, name: "[target] The value is less than min(scientific notation)"}
]
}
diff --git a/tests/wpt/web-platform-tests/html/semantics/forms/constraints/form-validation-validity-stepMismatch.html b/tests/wpt/web-platform-tests/html/semantics/forms/constraints/form-validation-validity-stepMismatch.html
index 174ecaf33a2..6d8192bfbfe 100644
--- a/tests/wpt/web-platform-tests/html/semantics/forms/constraints/form-validation-validity-stepMismatch.html
+++ b/tests/wpt/web-platform-tests/html/semantics/forms/constraints/form-validation-validity-stepMismatch.html
@@ -66,7 +66,8 @@
types: ["number"],
testData: [
{conditions: {step: "", value: "1"}, expected: false, name: "[target] The step attribute is not set"},
- {conditions: {step: 2 * 1 * 1, value: ""}, expected: false, name: "[target] The value attibute is empty string"},
+ {conditions: {step: "", value: "-.8"}, expected: true, name: "[target] The step attribute is not set and the value attribute is a floating number"},
+ {conditions: {step: 2 * 1 * 1, value: ""}, expected: false, name: "[target] The value attribute is empty string"},
{conditions: {step: 2 * 1 * 1, value: "2"}, expected: false, name: "[target] The value must match the step"},
{conditions: {step: 2 * 1 * 1, value: "3"}, expected: true, name: "[target] The value must mismatch the step"}
]
diff --git a/tests/wpt/web-platform-tests/interfaces/appmanifest.idl b/tests/wpt/web-platform-tests/interfaces/appmanifest.idl
index ddfe82dc34d..4a6425829f2 100644
--- a/tests/wpt/web-platform-tests/interfaces/appmanifest.idl
+++ b/tests/wpt/web-platform-tests/interfaces/appmanifest.idl
@@ -3,10 +3,10 @@
// (https://github.com/tidoust/reffy-reports)
// Source: Web App Manifest (https://w3c.github.io/manifest/)
-[Constructor(DOMString type, optional EventInit eventInitDict = {}),
- Exposed=Window]
+[Exposed=Window]
interface BeforeInstallPromptEvent : Event {
- Promise<PromptResponseObject> prompt();
+ constructor(DOMString type, optional EventInit eventInitDict = {});
+ Promise<PromptResponseObject> prompt();
};
dictionary PromptResponseObject {
diff --git a/tests/wpt/web-platform-tests/interfaces/dom.idl b/tests/wpt/web-platform-tests/interfaces/dom.idl
index 91157033c82..03a0201b16f 100644
--- a/tests/wpt/web-platform-tests/interfaces/dom.idl
+++ b/tests/wpt/web-platform-tests/interfaces/dom.idl
@@ -558,3 +558,51 @@ interface DOMTokenList {
[CEReactions] stringifier attribute DOMString value;
iterable<DOMString>;
};
+
+[Exposed=Window]
+interface XPathResult {
+ const unsigned short ANY_TYPE = 0;
+ const unsigned short NUMBER_TYPE = 1;
+ const unsigned short STRING_TYPE = 2;
+ const unsigned short BOOLEAN_TYPE = 3;
+ const unsigned short UNORDERED_NODE_ITERATOR_TYPE = 4;
+ const unsigned short ORDERED_NODE_ITERATOR_TYPE = 5;
+ const unsigned short UNORDERED_NODE_SNAPSHOT_TYPE = 6;
+ const unsigned short ORDERED_NODE_SNAPSHOT_TYPE = 7;
+ const unsigned short ANY_UNORDERED_NODE_TYPE = 8;
+ const unsigned short FIRST_ORDERED_NODE_TYPE = 9;
+
+ readonly attribute unsigned short resultType;
+ readonly attribute unrestricted double numberValue;
+ readonly attribute DOMString stringValue;
+ readonly attribute boolean booleanValue;
+ readonly attribute Node? singleNodeValue;
+ readonly attribute boolean invalidIteratorState;
+ readonly attribute unsigned long snapshotLength;
+
+ Node? iterateNext();
+ Node? snapshotItem(unsigned long index);
+};
+
+[Exposed=Window]
+interface XPathExpression {
+ // XPathResult.ANY_TYPE = 0
+ XPathResult evaluate(Node contextNode, optional unsigned short type = 0, optional XPathResult? result = null);
+};
+
+callback interface XPathNSResolver {
+ DOMString? lookupNamespaceURI(DOMString? prefix);
+};
+
+interface mixin XPathEvaluatorBase {
+ [NewObject] XPathExpression createExpression(DOMString expression, optional XPathNSResolver? resolver = null);
+ XPathNSResolver createNSResolver(Node nodeResolver);
+ // XPathResult.ANY_TYPE = 0
+ XPathResult evaluate(DOMString expression, Node contextNode, optional XPathNSResolver? resolver = null, optional unsigned short type = 0, optional XPathResult? result = null);
+};
+Document includes XPathEvaluatorBase;
+
+[Exposed=Window, Constructor]
+interface XPathEvaluator {};
+
+XPathEvaluator includes XPathEvaluatorBase;
diff --git a/tests/wpt/web-platform-tests/interfaces/entries-api.idl b/tests/wpt/web-platform-tests/interfaces/entries-api.idl
index 71e80c717b2..548aec13ab7 100644
--- a/tests/wpt/web-platform-tests/interfaces/entries-api.idl
+++ b/tests/wpt/web-platform-tests/interfaces/entries-api.idl
@@ -32,11 +32,11 @@ interface FileSystemEntry {
interface FileSystemDirectoryEntry : FileSystemEntry {
FileSystemDirectoryReader createReader();
void getFile(optional USVString? path,
- optional FileSystemFlags options,
+ optional FileSystemFlags options = {},
optional FileSystemEntryCallback successCallback,
optional ErrorCallback errorCallback);
void getDirectory(optional USVString? path,
- optional FileSystemFlags options,
+ optional FileSystemFlags options = {},
optional FileSystemEntryCallback successCallback,
optional ErrorCallback errorCallback);
};
diff --git a/tests/wpt/web-platform-tests/interfaces/web-nfc.idl b/tests/wpt/web-platform-tests/interfaces/web-nfc.idl
index 5107cf3b577..8c77339ae86 100644
--- a/tests/wpt/web-platform-tests/interfaces/web-nfc.idl
+++ b/tests/wpt/web-platform-tests/interfaces/web-nfc.idl
@@ -3,8 +3,10 @@
// (https://github.com/tidoust/reffy-reports)
// Source: Web NFC API (https://w3c.github.io/web-nfc/)
-[Constructor(NDEFMessageInit messageInit), Exposed=Window]
+[Exposed=Window]
interface NDEFMessage {
+ constructor(NDEFMessageInit messageInit);
+
readonly attribute USVString url;
readonly attribute FrozenArray<NDEFRecord> records;
};
@@ -16,19 +18,24 @@ dictionary NDEFMessageInit {
typedef any NDEFRecordData;
-[Constructor(NDEFRecordInit recordInit), Exposed=Window]
+[Exposed=Window]
interface NDEFRecord {
+ constructor(NDEFRecordInit recordInit);
+
readonly attribute NDEFRecordType recordType;
readonly attribute USVString mediaType;
+ readonly attribute USVString id;
USVString? toText();
[NewObject] ArrayBuffer? toArrayBuffer();
[NewObject] any toJSON();
+ sequence<NDEFRecord> toRecords();
};
dictionary NDEFRecordInit {
NDEFRecordType recordType;
USVString mediaType;
+ USVString id;
NDEFRecordData data;
};
@@ -37,21 +44,27 @@ typedef DOMString NDEFRecordType;
typedef (DOMString or ArrayBuffer or NDEFMessageInit) NDEFMessageSource;
-[Constructor, SecureContext, Exposed=Window]
+[SecureContext, Exposed=Window]
interface NFCWriter {
+ constructor();
+
Promise<void> push(NDEFMessageSource message, optional NFCPushOptions options={});
};
-[Constructor, SecureContext, Exposed=Window]
+[SecureContext, Exposed=Window]
interface NFCReader : EventTarget {
+ constructor();
+
attribute EventHandler onreading;
attribute EventHandler onerror;
void scan(optional NFCScanOptions options={});
};
-[Constructor(DOMString type, NFCReadingEventInit readingEventInitDict), SecureContext, Exposed=Window]
+[SecureContext, Exposed=Window]
interface NFCReadingEvent : Event {
+ constructor(DOMString type, NFCReadingEventInit readingEventInitDict);
+
readonly attribute DOMString serialNumber;
[SameObject] readonly attribute NDEFMessage message;
};
@@ -61,8 +74,10 @@ dictionary NFCReadingEventInit : EventInit {
required NDEFMessageInit message;
};
-[Constructor(DOMString type, NFCErrorEventInit errorEventInitDict), SecureContext, Exposed=Window]
+[SecureContext, Exposed=Window]
interface NFCErrorEvent : Event {
+ constructor(DOMString type, NFCErrorEventInit errorEventInitDict);
+
readonly attribute DOMException error;
};
diff --git a/tests/wpt/web-platform-tests/mathml/relations/html5-tree/css-inline-style-dynamic.tentative-ref.html b/tests/wpt/web-platform-tests/mathml/relations/html5-tree/css-inline-style-dynamic.tentative-ref.html
new file mode 100644
index 00000000000..13f01392736
--- /dev/null
+++ b/tests/wpt/web-platform-tests/mathml/relations/html5-tree/css-inline-style-dynamic.tentative-ref.html
@@ -0,0 +1,13 @@
+<!DOCTYPE html>
+<html>
+<head>
+<meta charset="utf-8"/>
+<title>MathML 'ElementCSSInlineStyle` Dynamic Tests</title>
+</head>
+<body>
+ <span>This tests that `ElementCSSInlineStyle` interface changes update rendering.</span>
+ <div>
+ <math style="background-color: green"><mspace width="50px" height="100px"/><mspace width="50px" height="100px"/></math>
+ </div>
+</body>
+</html>
diff --git a/tests/wpt/web-platform-tests/mathml/relations/html5-tree/css-inline-style-dynamic.tentative.html b/tests/wpt/web-platform-tests/mathml/relations/html5-tree/css-inline-style-dynamic.tentative.html
new file mode 100644
index 00000000000..ca3e6794919
--- /dev/null
+++ b/tests/wpt/web-platform-tests/mathml/relations/html5-tree/css-inline-style-dynamic.tentative.html
@@ -0,0 +1,37 @@
+<!DOCTYPE html>
+<html class="reftest-wait">
+ <head>
+ <meta charset="utf-8" />
+ <title>MathML 'ElementCSSInlineStyle` Dynamic Tests</title>
+ <link rel="help" href="https://mathml-refresh.github.io/mathml-core/#dom-and-javascript"/>
+ <link rel="match" href="css-inline-style-dynamic.tentative-ref.html"/>
+ <style>
+ #hidden {
+ visibility: hidden;
+ background-color: green;
+ }
+ #red {
+ background-color: red;
+ }
+ </style>
+ <meta
+ name="assert"
+ content="MathMLElements ElementCSSInlineStyle interface changes update rendering"
+ />
+ <script type="text/javascript">
+ function test()
+ {
+ document.body.offsetTop; // Update layout
+ document.getElementById("hidden").style.visibility = "visible";
+ document.getElementById("red").style.backgroundColor = "green";
+ document.documentElement.className = "";
+ }
+ </script>
+ </head>
+ <body onload="test()">
+ <span>This tests that `ElementCSSInlineStyle` interface changes update rendering.</span>
+ <div>
+ <math><mspace width="50px" height="100px" id="hidden"/><mspace width="50px" height="100px" id="red"/></math>
+ </div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/mixed-content/generic/mixed-content-test-case.js b/tests/wpt/web-platform-tests/mixed-content/generic/mixed-content-test-case.js
index eb9fc13f7c0..ee34c4973a9 100644
--- a/tests/wpt/web-platform-tests/mixed-content/generic/mixed-content-test-case.js
+++ b/tests/wpt/web-platform-tests/mixed-content/generic/mixed-content-test-case.js
@@ -73,7 +73,7 @@ function MixedContentTestCase(scenario, description, sanityChecker) {
// We bridge this inconsistency here, and will later pass these information
// directly from the generated tests and remove this conversion here.
subresourceType = 'fetch-request';
- sourceContextList = [{sourceContextType: 'classic-data-worker'}];
+ sourceContextList = [{sourceContextType: 'worker-classic-data'}];
}
const originTypeConversion = {
diff --git a/tests/wpt/web-platform-tests/mixed-content/generic/test-case.sub.js b/tests/wpt/web-platform-tests/mixed-content/generic/test-case.sub.js
new file mode 100644
index 00000000000..d25986e5c26
--- /dev/null
+++ b/tests/wpt/web-platform-tests/mixed-content/generic/test-case.sub.js
@@ -0,0 +1,127 @@
+/**
+ * @fileoverview Test case for mixed-content in Web Platform Tests.
+ * @author burnik@google.com (Kristijan Burnik)
+ */
+
+// TODO: This function is currently placed and duplicated at:
+// - mixed-content/generic/mixed-content-test-case.js
+// - referrer-policy/generic/referrer-policy-test-case.js
+// but should be moved to /common/security-features/resources/common.js.
+function getSubresourceOrigin(originType) {
+ const httpProtocol = "http";
+ const httpsProtocol = "https";
+ const wsProtocol = "ws";
+ const wssProtocol = "wss";
+
+ const sameOriginHost = "{{host}}";
+ const crossOriginHost = "{{domains[www1]}}";
+
+ // These values can evaluate to either empty strings or a ":port" string.
+ const httpPort = getNormalizedPort(parseInt("{{ports[http][0]}}", 10));
+ const httpsPort = getNormalizedPort(parseInt("{{ports[https][0]}}", 10));
+ const wsPort = getNormalizedPort(parseInt("{{ports[ws][0]}}", 10));
+ const wssPort = getNormalizedPort(parseInt("{{ports[wss][0]}}", 10));
+
+ /**
+ @typedef OriginType
+ @type {string}
+
+ Represents the origin of the subresource request URL.
+ The keys of `originMap` below are the valid values.
+
+ Note that there can be redirects from the specified origin
+ (see RedirectionType), and thus the origin of the subresource
+ response URL might be different from what is specified by OriginType.
+ */
+ const originMap = {
+ "same-https": httpsProtocol + "://" + sameOriginHost + httpsPort,
+ "same-http": httpProtocol + "://" + sameOriginHost + httpPort,
+ "cross-https": httpsProtocol + "://" + crossOriginHost + httpsPort,
+ "cross-http": httpProtocol + "://" + crossOriginHost + httpPort,
+ "same-wss": wssProtocol + "://" + sameOriginHost + wssPort,
+ "same-ws": wsProtocol + "://" + sameOriginHost + wsPort,
+ "cross-wss": wssProtocol + "://" + crossOriginHost + wssPort,
+ "cross-ws": wsProtocol + "://" + crossOriginHost + wsPort,
+ };
+
+ return originMap[originType];
+}
+
+/**
+ * MixedContentTestCase exercises all the tests for checking browser behavior
+ * when resources regarded as mixed-content are requested. A single run covers
+ * only a single scenario.
+ * @param {object} scenario A JSON describing the test arrangement and
+ * expectation(s). Refer to /mixed-content/spec.src.json for details.
+ * @param {string} description The test scenario verbose description.
+ * @param {SanityChecker} sanityChecker Instance of an object used to check the
+ * running scenario. Useful in debug mode. See ./sanity-checker.js.
+ * Run {@code ./tools/generate.py -h} for info on test generating modes.
+ * @return {object} Object wrapping the start method used to run the test.
+ */
+function TestCase(scenario, description, sanityChecker) {
+ sanityChecker.checkScenario(scenario, subresourceMap);
+
+ const redirectionTypeConversion = {
+ "no-redirect": "no-redirect",
+ "keep-scheme": "keep-scheme-redirect",
+ "swap-scheme": "swap-scheme-redirect",
+ "keep-origin": "keep-origin-redirect",
+ "swap-origin": "swap-origin-redirect"
+ };
+ const subresourceTypeConversion = {
+ "beacon": "beacon-request",
+ "fetch": "fetch-request",
+ "xhr": "xhr-request",
+ "websocket": "websocket-request",
+ "worker-classic": "worker-request",
+ "worker-module": "module-worker",
+ "worker-import-data": "module-data-worker-import",
+ "sharedworker-classic": "shared-worker",
+ "worklet-animation": "worklet-animation-top-level",
+ "worklet-audio": "worklet-audio-top-level",
+ "worklet-layout": "worklet-layout-top-level",
+ "worklet-paint": "worklet-paint-top-level",
+ "worklet-animation-import-data": "worklet-animation-data-import",
+ "worklet-audio-import-data": "worklet-audio-data-import",
+ "worklet-layout-import-data": "worklet-layout-data-import",
+ "worklet-paint-import-data": "worklet-paint-data-import"
+ };
+ const subresourceType =
+ subresourceTypeConversion[scenario.subresource] || scenario.subresource;
+
+ const urls = getRequestURLs(subresourceType,
+ scenario.origin,
+ redirectionTypeConversion[scenario.redirection]);
+ const checkResult = _ => {
+ // Send request to check if the key has been torn down.
+ return xhrRequest(urls.assertUrl)
+ .then(assertResult => {
+ // Now check if the value has been torn down. If it's still there,
+ // we have blocked the request to mixed-content.
+ assert_equals(assertResult.status, scenario.expectation,
+ "The resource request should be '" + scenario.expectation + "'.");
+ });
+ };
+
+ function runTest() {
+ /** @type {Subresource} */
+ const subresource = {
+ subresourceType: subresourceType,
+ url: urls.testUrl,
+ policyDeliveries: scenario.subresource_policy_deliveries,
+ };
+
+ promise_test(() => {
+ return xhrRequest(urls.announceUrl)
+ // Send out the real resource request.
+ // This should tear down the key if it's not blocked.
+ .then(_ => invokeRequest(subresource, scenario.source_context_list))
+ // We check the key state, regardless of whether the main request
+ // succeeded or failed.
+ .then(checkResult, checkResult);
+ }, description);
+ } // runTest
+
+ return {start: runTest};
+}
diff --git a/tests/wpt/web-platform-tests/mixed-content/generic/tools/generate.py b/tests/wpt/web-platform-tests/mixed-content/generic/tools/generate.py
index 9c911aa6c41..b80bc8df6bb 100755
--- a/tests/wpt/web-platform-tests/mixed-content/generic/tools/generate.py
+++ b/tests/wpt/web-platform-tests/mixed-content/generic/tools/generate.py
@@ -13,36 +13,25 @@ import generate
class MixedContentConfig(object):
def __init__(self):
- self.selection_pattern = '%(subresource)s/' + \
- '%(delivery_type)s/' + \
- '%(delivery_value)s/' + \
- '%(origin)s/' + \
- 'top-level/' + \
- '%(redirection)s/'
-
- self.test_file_path_pattern = self.selection_pattern + \
- '%(spec_name)s/' + \
- '%(name)s.%(source_scheme)s.html'
-
- self.test_description_template = '''delivery_type: %(delivery_type)s
-delivery_value: %(delivery_value)s
-origin: %(origin)s
-source_scheme: %(source_scheme)s
-context_nesting: top-level
-redirection: %(redirection)s
-subresource: %(subresource)s
-expectation: %(expectation)s
-'''
+ self.selection_pattern = \
+ '%(source_context_list)s.%(delivery_type)s/' + \
+ '%(delivery_value)s/' + \
+ '%(subresource)s/' + \
+ '%(origin)s.%(redirection)s.%(source_scheme)s'
+
+ self.test_file_path_pattern = 'gen/' + self.selection_pattern + '.html'
+
+ self.test_description_template = 'Mixed-Content: Expects %(expectation)s for %(subresource)s to %(origin)s origin and %(redirection)s redirection from %(source_scheme)s context.'
self.test_page_title_template = 'Mixed-Content: %s'
- self.helper_js = '/mixed-content/generic/mixed-content-test-case.js?pipe=sub'
+ self.helper_js = '/mixed-content/generic/test-case.sub.js'
# For debug target only.
self.sanity_checker_js = '/mixed-content/generic/sanity-checker.js'
self.spec_json_js = '/mixed-content/spec_json.js'
- self.test_case_name = 'MixedContentTestCase'
+ self.test_case_name = 'TestCase'
script_directory = os.path.dirname(os.path.abspath(__file__))
self.spec_directory = os.path.abspath(
diff --git a/tests/wpt/web-platform-tests/mixed-content/spec.src.json b/tests/wpt/web-platform-tests/mixed-content/spec.src.json
index 95dc2d318f5..e4844a8016b 100644
--- a/tests/wpt/web-platform-tests/mixed-content/spec.src.json
+++ b/tests/wpt/web-platform-tests/mixed-content/spec.src.json
@@ -10,6 +10,7 @@
"name": "opt-in-blocks",
"expansion": "default",
"source_scheme": "https",
+ "source_context_list": "*",
"delivery_type": "*",
"delivery_value": "opt-in",
"redirection": "*",
@@ -27,6 +28,7 @@
"name": "no-opt-in-allows",
"expansion": "default",
"source_scheme": "https",
+ "source_context_list": "*",
"delivery_type": "*",
"delivery_value": null,
"redirection": "*",
@@ -52,6 +54,7 @@
"name": "opt-in-blocks",
"expansion": "default",
"source_scheme": "https",
+ "source_context_list": "*",
"delivery_type": "*",
"delivery_value": "opt-in",
"redirection": "*",
@@ -69,6 +72,7 @@
"name": "no-opt-in-blocks",
"expansion": "default",
"source_scheme": "https",
+ "source_context_list": "*",
"delivery_type": "*",
"delivery_value": null,
"redirection": "*",
@@ -86,11 +90,12 @@
"name": "ws-downgrade-blocks",
"expansion": "default",
"source_scheme": "https",
+ "source_context_list": "*",
"delivery_type": "*",
"delivery_value": "*",
"redirection": "*",
"subresource": {
- "blockable": "websocket-request",
+ "blockable": "websocket",
"optionally-blockable": []
},
"origin": [
@@ -111,6 +116,7 @@
"name": "allowed",
"expansion": "default",
"source_scheme": "https",
+ "source_context_list": "*",
"delivery_type": "*",
"delivery_value": "*",
"redirection": [
@@ -130,6 +136,7 @@
"name": "websocket-allowed",
"expansion": "default",
"source_scheme": "https",
+ "source_context_list": "*",
"delivery_type": "*",
"delivery_value": "*",
"redirection": [
@@ -137,7 +144,7 @@
"keep-scheme"
],
"subresource": {
- "blockable": "websocket-request",
+ "blockable": "websocket",
"optionally-blockable": []
},
"origin": [
@@ -154,6 +161,7 @@
"name": "Skip-redundant-no-opt-in",
"expansion": "*",
"source_scheme": "*",
+ "source_context_list": "*",
"delivery_type": "http-rp",
"delivery_value": null,
"redirection": "*",
@@ -168,6 +176,7 @@
"name": "Redundant-subresources",
"expansion": "*",
"source_scheme": "*",
+ "source_context_list": "*",
"delivery_type": "*",
"delivery_value": "*",
"redirection": "*",
@@ -184,12 +193,13 @@
"name": "Skip-origins-not-applicable-to-websockets",
"expansion": "*",
"source_scheme": "*",
+ "source_context_list": "*",
"delivery_type": "*",
"delivery_value": "*",
"redirection": "*",
"subresource": {
"blockable": [
- "websocket-request"
+ "websocket"
],
"optionally-blockable": []
},
@@ -205,6 +215,7 @@
"name": "Skip-redundant-for-opt-in-method",
"expansion": "*",
"source_scheme": "*",
+ "source_context_list": "*",
"delivery_type": "meta",
"delivery_value": "opt-in",
"redirection": [
@@ -219,6 +230,126 @@
"expectation": "*"
}
],
+ "source_context_schema": {
+ "supported_delivery_type": {
+ "top": [
+ "http-rp",
+ "meta"
+ ],
+ "iframe": [
+ "http-rp",
+ "meta"
+ ],
+ "srcdoc": [
+ "meta"
+ ],
+ "worker-classic": [
+ "http-rp"
+ ],
+ "worker-module": [
+ "http-rp"
+ ],
+ "worker-classic-data": [],
+ "worker-module-data": []
+ },
+ "supported_subresource": {
+ "top": "*",
+ "iframe": "*",
+ "srcdoc": "*",
+ "worker-classic": [
+ "xhr",
+ "fetch",
+ "websocket"
+ ],
+ "worker-module": [
+ "xhr",
+ "fetch",
+ "websocket"
+ ],
+ "worker-classic-data": [
+ "xhr",
+ "fetch",
+ "websocket"
+ ],
+ "worker-module-data": [
+ "xhr",
+ "fetch",
+ "websocket"
+ ]
+ }
+ },
+ "subresource_schema": {
+ "supported_delivery_type": {
+ "script-tag": [],
+ "link-css-tag": [],
+ "xhr": [],
+ "worker-classic": [],
+ "worker-module": [],
+ "worker-import-data": [],
+ "worklet-animation": [],
+ "worklet-audio": [],
+ "worklet-layout": [],
+ "worklet-paint": [],
+ "worklet-animation-import-data": [],
+ "worklet-audio-import-data": [],
+ "worklet-layout-import-data": [],
+ "worklet-paint-import-data": [],
+ "fetch": [],
+ "a-tag": [],
+ "object-tag": [],
+ "picture-tag": [],
+ "websocket": [],
+ "link-prefetch-tag": [],
+ "beacon": [],
+ "img-tag": [],
+ "audio-tag": [],
+ "video-tag": []
+ }
+ },
+ "source_context_list_schema": {
+ "top": {
+ "description": "Policy set by the top-level Document",
+ "sourceContextList": [
+ {
+ "sourceContextType": "top",
+ "policyDeliveries": [
+ "policy"
+ ]
+ }
+ ],
+ "subresourcePolicyDeliveries": []
+ },
+ "worker-classic-data": {
+ "sourceContextList": [
+ {
+ "sourceContextType": "top",
+ "policyDeliveries": [
+ "policy"
+ ]
+ },
+ {
+ "sourceContextType": "worker-classic-data",
+ "policyDeliveries": []
+ }
+ ],
+ "subresourcePolicyDeliveries": []
+ },
+ "worker-module-data": {
+ "sourceContextList": [
+ {
+ "sourceContextType": "top",
+ "policyDeliveries": [
+ "policy"
+ ]
+ },
+ {
+ "sourceContextType": "worker-module-data",
+ "policyDeliveries": []
+ }
+ ],
+ "subresourcePolicyDeliveries": []
+ }
+ },
"test_expansion_schema": {
"expansion": [
"default",
@@ -236,6 +367,11 @@
null,
"opt-in"
],
+ "source_context_list": [
+ "top",
+ "worker-classic-data",
+ "worker-module-data"
+ ],
"redirection": [
"no-redirect",
"keep-scheme",
@@ -255,26 +391,25 @@
"blockable": [
"script-tag",
"link-css-tag",
- "xhr-request",
- "worker-request",
- "module-worker-top-level",
- "module-data-worker-import",
- "classic-data-worker-fetch",
- "worklet-animation-top-level",
- "worklet-audio-top-level",
- "worklet-layout-top-level",
- "worklet-paint-top-level",
- "worklet-animation-data-import",
- "worklet-audio-data-import",
- "worklet-layout-data-import",
- "worklet-paint-data-import",
- "fetch-request",
+ "xhr",
+ "worker-classic",
+ "worker-module",
+ "worker-import-data",
+ "worklet-animation",
+ "worklet-audio",
+ "worklet-layout",
+ "worklet-paint",
+ "worklet-animation-import-data",
+ "worklet-audio-import-data",
+ "worklet-layout-import-data",
+ "worklet-paint-import-data",
+ "fetch",
"a-tag",
"object-tag",
"picture-tag",
- "websocket-request",
+ "websocket",
"link-prefetch-tag",
- "beacon-request"
+ "beacon"
],
"optionally-blockable": [
"img-tag",
diff --git a/tests/wpt/web-platform-tests/mixed-content/spec_json.js b/tests/wpt/web-platform-tests/mixed-content/spec_json.js
index 0868df220fb..009a853077b 100644
--- a/tests/wpt/web-platform-tests/mixed-content/spec_json.js
+++ b/tests/wpt/web-platform-tests/mixed-content/spec_json.js
@@ -1 +1 @@
-var SPEC_JSON = {"test_expansion_schema": {"origin": ["same-host-https", "same-host-http", "cross-origin-https", "cross-origin-http", "same-host-wss", "same-host-ws", "cross-origin-wss", "cross-origin-ws"], "subresource": {"blockable": ["script-tag", "link-css-tag", "xhr-request", "worker-request", "module-worker-top-level", "module-data-worker-import", "classic-data-worker-fetch", "worklet-animation-top-level", "worklet-audio-top-level", "worklet-layout-top-level", "worklet-paint-top-level", "worklet-animation-data-import", "worklet-audio-data-import", "worklet-layout-data-import", "worklet-paint-data-import", "fetch-request", "a-tag", "object-tag", "picture-tag", "websocket-request", "link-prefetch-tag", "beacon-request"], "optionally-blockable": ["img-tag", "audio-tag", "video-tag"]}, "context_nesting": ["top-level", "sub-level"], "expectation": ["allowed", "blocked"], "expansion": ["default", "override"], "redirection": ["no-redirect", "keep-scheme-redirect", "swap-scheme-redirect"], "opt_in_method": ["no-opt-in", "http-csp", "meta-csp", "img-crossorigin"], "source_scheme": ["http", "https"]}, "specification": [{"test_expansion": [{"origin": ["cross-origin-http", "same-host-http"], "name": "opt-in-blocks", "redirection": "*", "expectation": "blocked", "expansion": "default", "context_nesting": "top-level", "opt_in_method": ["http-csp", "meta-csp"], "source_scheme": "https", "subresource": {"blockable": [], "optionally-blockable": "*"}}, {"origin": ["cross-origin-http", "same-host-http"], "name": "no-opt-in-allows", "redirection": "*", "expectation": "allowed", "expansion": "default", "context_nesting": "top-level", "opt_in_method": "no-opt-in", "source_scheme": "https", "subresource": {"blockable": [], "optionally-blockable": "*"}}], "description": "Test behavior of optionally-blockable content", "specification_url": "http://www.w3.org/TR/mixed-content/#category-optionally-blockable", "name": "optionally-blockable", "title": "Optionally-blockable content"}, {"test_expansion": [{"origin": ["cross-origin-http", "same-host-http"], "name": "opt-in-blocks", "redirection": "*", "expectation": "blocked", "expansion": "default", "context_nesting": "top-level", "opt_in_method": ["http-csp", "meta-csp"], "source_scheme": "https", "subresource": {"blockable": "*", "optionally-blockable": []}}, {"origin": ["cross-origin-http", "same-host-http"], "name": "no-opt-in-blocks", "redirection": "*", "expectation": "blocked", "expansion": "default", "context_nesting": "top-level", "opt_in_method": "no-opt-in", "source_scheme": "https", "subresource": {"blockable": "*", "optionally-blockable": []}}, {"origin": ["cross-origin-ws", "same-host-ws"], "name": "ws-downgrade-blocks", "redirection": "*", "expectation": "blocked", "expansion": "default", "context_nesting": "top-level", "opt_in_method": ["no-opt-in", "http-csp", "meta-csp"], "source_scheme": "https", "subresource": {"blockable": "websocket-request", "optionally-blockable": []}}], "description": "Test behavior of blockable content.", "specification_url": "http://www.w3.org/TR/mixed-content/#category-blockable", "name": "blockable", "title": "Blockable content"}, {"test_expansion": [{"origin": ["same-host-https"], "name": "allowed", "redirection": ["no-redirect", "keep-scheme-redirect"], "expectation": "allowed", "expansion": "default", "context_nesting": "top-level", "opt_in_method": "*", "source_scheme": "https", "subresource": {"blockable": "*", "optionally-blockable": "*"}}, {"origin": ["same-host-wss"], "name": "websocket-allowed", "redirection": ["no-redirect", "keep-scheme-redirect"], "expectation": "allowed", "expansion": "default", "context_nesting": "top-level", "opt_in_method": "*", "source_scheme": "https", "subresource": {"blockable": "websocket-request", "optionally-blockable": []}}], "description": "Test behavior of allowed content.", "specification_url": "http://www.w3.org/TR/mixed-content/", "name": "allowed", "title": "Allowed content"}], "excluded_tests": [{"origin": "*", "name": "Redundant-subresources", "redirection": "*", "expectation": "*", "expansion": "*", "context_nesting": "*", "opt_in_method": "*", "source_scheme": "*", "subresource": {"blockable": ["a-tag"], "optionally-blockable": []}}, {"origin": ["same-host-https", "same-host-http", "cross-origin-https", "cross-origin-http"], "name": "Skip-origins-not-applicable-to-websockets", "redirection": "*", "expectation": "*", "expansion": "*", "context_nesting": "*", "opt_in_method": "*", "source_scheme": "*", "subresource": {"blockable": ["websocket-request"], "optionally-blockable": []}}, {"origin": "*", "name": "TODO-opt-in-method-img-cross-origin", "redirection": "*", "expectation": "*", "expansion": "*", "context_nesting": "*", "opt_in_method": "img-crossorigin", "source_scheme": "*", "subresource": {"blockable": "*", "optionally-blockable": "*"}}, {"origin": "*", "name": "Skip-redundant-for-opt-in-method", "redirection": ["keep-scheme-redirect", "swap-scheme-redirect"], "expectation": "*", "expansion": "*", "context_nesting": "*", "opt_in_method": ["meta-csp", "img-crossorigin"], "source_scheme": "*", "subresource": {"blockable": "*", "optionally-blockable": "*"}}]};
+var SPEC_JSON = {"subresource_schema": {"supported_delivery_type": {"picture-tag": [], "worklet-layout": [], "worklet-paint": [], "img-tag": [], "a-tag": [], "worklet-layout-import-data": [], "worklet-audio-import-data": [], "worklet-animation": [], "websocket": [], "worklet-paint-import-data": [], "video-tag": [], "object-tag": [], "worklet-audio": [], "beacon": [], "worker-module": [], "worker-import-data": [], "script-tag": [], "worklet-animation-import-data": [], "link-css-tag": [], "xhr": [], "worker-classic": [], "link-prefetch-tag": [], "audio-tag": [], "fetch": []}}, "excluded_tests": [{"delivery_value": null, "origin": "*", "delivery_type": "http-rp", "name": "Skip-redundant-no-opt-in", "expectation": "*", "expansion": "*", "redirection": "*", "source_context_list": "*", "source_scheme": "*", "subresource": {"blockable": "*", "optionally-blockable": "*"}}, {"delivery_value": "*", "origin": "*", "delivery_type": "*", "name": "Redundant-subresources", "expectation": "*", "expansion": "*", "redirection": "*", "source_context_list": "*", "source_scheme": "*", "subresource": {"blockable": ["a-tag"], "optionally-blockable": []}}, {"delivery_value": "*", "origin": ["same-https", "same-http", "cross-https", "cross-http"], "delivery_type": "*", "name": "Skip-origins-not-applicable-to-websockets", "expectation": "*", "expansion": "*", "redirection": "*", "source_context_list": "*", "source_scheme": "*", "subresource": {"blockable": ["websocket"], "optionally-blockable": []}}, {"delivery_value": "opt-in", "origin": "*", "delivery_type": "meta", "name": "Skip-redundant-for-opt-in-method", "expectation": "*", "expansion": "*", "redirection": ["keep-scheme", "swap-scheme"], "source_context_list": "*", "source_scheme": "*", "subresource": {"blockable": "*", "optionally-blockable": "*"}}], "specification": [{"test_expansion": [{"delivery_value": "opt-in", "origin": ["cross-http", "same-http"], "delivery_type": "*", "name": "opt-in-blocks", "expectation": "blocked", "expansion": "default", "redirection": "*", "source_context_list": "*", "source_scheme": "https", "subresource": {"blockable": [], "optionally-blockable": "*"}}, {"delivery_value": null, "origin": ["cross-http", "same-http"], "delivery_type": "*", "name": "no-opt-in-allows", "expectation": "allowed", "expansion": "default", "redirection": "*", "source_context_list": "*", "source_scheme": "https", "subresource": {"blockable": [], "optionally-blockable": "*"}}], "description": "Test behavior of optionally-blockable content", "specification_url": "http://www.w3.org/TR/mixed-content/#category-optionally-blockable", "name": "optionally-blockable", "title": "Optionally-blockable content"}, {"test_expansion": [{"delivery_value": "opt-in", "origin": ["cross-http", "same-http"], "delivery_type": "*", "name": "opt-in-blocks", "expectation": "blocked", "expansion": "default", "redirection": "*", "source_context_list": "*", "source_scheme": "https", "subresource": {"blockable": "*", "optionally-blockable": []}}, {"delivery_value": null, "origin": ["cross-http", "same-http"], "delivery_type": "*", "name": "no-opt-in-blocks", "expectation": "blocked", "expansion": "default", "redirection": "*", "source_context_list": "*", "source_scheme": "https", "subresource": {"blockable": "*", "optionally-blockable": []}}, {"delivery_value": "*", "origin": ["cross-ws", "same-ws"], "delivery_type": "*", "name": "ws-downgrade-blocks", "expectation": "blocked", "expansion": "default", "redirection": "*", "source_context_list": "*", "source_scheme": "https", "subresource": {"blockable": "websocket", "optionally-blockable": []}}], "description": "Test behavior of blockable content.", "specification_url": "http://www.w3.org/TR/mixed-content/#category-blockable", "name": "blockable", "title": "Blockable content"}, {"test_expansion": [{"delivery_value": "*", "origin": ["same-https"], "delivery_type": "*", "name": "allowed", "expectation": "allowed", "expansion": "default", "redirection": ["no-redirect", "keep-scheme"], "source_context_list": "*", "source_scheme": "https", "subresource": {"blockable": "*", "optionally-blockable": "*"}}, {"delivery_value": "*", "origin": ["same-wss"], "delivery_type": "*", "name": "websocket-allowed", "expectation": "allowed", "expansion": "default", "redirection": ["no-redirect", "keep-scheme"], "source_context_list": "*", "source_scheme": "https", "subresource": {"blockable": "websocket", "optionally-blockable": []}}], "description": "Test behavior of allowed content.", "specification_url": "http://www.w3.org/TR/mixed-content/", "name": "allowed", "title": "Allowed content"}], "test_expansion_schema": {"delivery_value": [null, "opt-in"], "origin": ["same-https", "same-http", "cross-https", "cross-http", "same-wss", "same-ws", "cross-wss", "cross-ws"], "delivery_type": ["http-rp", "meta"], "subresource": {"blockable": ["script-tag", "link-css-tag", "xhr", "worker-classic", "worker-module", "worker-import-data", "worklet-animation", "worklet-audio", "worklet-layout", "worklet-paint", "worklet-animation-import-data", "worklet-audio-import-data", "worklet-layout-import-data", "worklet-paint-import-data", "fetch", "a-tag", "object-tag", "picture-tag", "websocket", "link-prefetch-tag", "beacon"], "optionally-blockable": ["img-tag", "audio-tag", "video-tag"]}, "expectation": ["allowed", "blocked"], "expansion": ["default", "override"], "redirection": ["no-redirect", "keep-scheme", "swap-scheme"], "source_context_list": ["top", "worker-classic-data", "worker-module-data"], "source_scheme": ["http", "https"]}, "source_context_list_schema": {"worker-classic-data": {"subresourcePolicyDeliveries": [], "sourceContextList": [{"sourceContextType": "top", "policyDeliveries": ["policy"]}, {"sourceContextType": "worker-classic-data", "policyDeliveries": []}]}, "top": {"subresourcePolicyDeliveries": [], "description": "Policy set by the top-level Document", "sourceContextList": [{"sourceContextType": "top", "policyDeliveries": ["policy"]}]}, "worker-module-data": {"subresourcePolicyDeliveries": [], "sourceContextList": [{"sourceContextType": "top", "policyDeliveries": ["policy"]}, {"sourceContextType": "worker-module-data", "policyDeliveries": []}]}}, "delivery_key": "mixedContent", "source_context_schema": {"supported_delivery_type": {"iframe": ["http-rp", "meta"], "worker-module-data": [], "worker-classic-data": [], "top": ["http-rp", "meta"], "worker-classic": ["http-rp"], "worker-module": ["http-rp"], "srcdoc": ["meta"]}, "supported_subresource": {"iframe": "*", "worker-module-data": ["xhr", "fetch", "websocket"], "worker-classic-data": ["xhr", "fetch", "websocket"], "top": "*", "worker-classic": ["xhr", "fetch", "websocket"], "worker-module": ["xhr", "fetch", "websocket"], "srcdoc": "*"}}};
diff --git a/tests/wpt/web-platform-tests/pointerevents/extension/pointerevent_coalesced_events_attributes-manual.html b/tests/wpt/web-platform-tests/pointerevents/extension/pointerevent_coalesced_events_attributes-manual.html
deleted file mode 100644
index 89149468a5d..00000000000
--- a/tests/wpt/web-platform-tests/pointerevents/extension/pointerevent_coalesced_events_attributes-manual.html
+++ /dev/null
@@ -1,144 +0,0 @@
-<!doctype html>
-<html>
- <head>
- <title>Pointer Events coalesced events count and properties<</title>
- <meta name="viewport" content="width=device-width">
- <link rel="stylesheet" type="text/css" href="../pointerevent_styles.css">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- Additional helper script for common checks across event types -->
- <script type="text/javascript" src="../pointerevent_support.js"></script>
- <script>
- var eventList = All_Pointer_Events;
- PhaseEnum = {
- WaitingForCancel: 0,
- WaitingForOver: 1,
- WaitingForEnter: 2,
- WaitingForDown: 3,
- WaitingForMove: 4,
- WaitingForUp: 5,
- WaitingForOut: 6,
- WaitingForLeave: 7,
- Done: 8,
- };
- var phase = PhaseEnum.WaitingForCancel;
-
- function resetTestState() {
- phase = PhaseEnum.WaitingForCancel;
- }
- function expect_no_coalesced_events(event, eventName) {
- test(function () {
- assert_equals(event.getCoalescedEvents().length, 0, eventName + ' should not have any coalesced events');
- }, expectedPointerType + ' ' + eventName + ' should not have any coalesced events');
- }
- function run() {
- var test_pointerEvent = setup_pointerevent_test("coalesced events attributes in pointerevents", ['touch']);
- var target0 = document.getElementById("target0");
- var target1 = document.getElementById("target1");
-
- on_event(target0, 'pointercancel', function (event) {
- if (phase == PhaseEnum.WaitingForCancel) {
- expect_no_coalesced_events(event, 'pointercancel');
- phase++;
- }
- });
- eventList.forEach(function(eventName) {
- on_event(target1, eventName, function (event) {
- switch (phase) {
- case PhaseEnum.WaitingForOver:
- if (eventName == 'pointerover') {
- expect_no_coalesced_events(event, eventName);
- phase++;
- }
- break;
- case PhaseEnum.WaitingForEnter:
- if (eventName == 'pointerenter') {
- expect_no_coalesced_events(event, eventName);
- phase++;
- }
- break;
- case PhaseEnum.WaitingForDown:
- if (eventName == 'pointerdown') {
- expect_no_coalesced_events(event, eventName);
- phase++;
- setTimeout(function(){
- // This is just a way to block the main thread.
- var current = new Date().getTime();
- for (; new Date().getTime() - current < 500;);
- }, 0);
- }
- break;
- case PhaseEnum.WaitingForMove:
- if (eventName == 'pointermove') {
- var coalescedEvents = event.getCoalescedEvents();
- test (function() {
- assert_greater_than(event.getCoalescedEvents().length, 1, 'pointermove should have at least 2 coalesced events.');
- }, expectedPointerType + ' pointermove should have >2 coalesced events as main thread is busy.');
- test (function() {
- for (var i=0; i<coalescedEvents.length; i++) {
- assert_equals(coalescedEvents[i].isTrusted, true, 'isTrusted flag should be true for coalesced events.');
- if (i > 0)
- assert_greater_than_equal(coalescedEvents[i].timeStamp, coalescedEvents[i-1].timeStamp, 'Time stamps of coalesced events must be ascending.');
- }
- }, expectedPointerType + ' pointermove coalesced events should all be marked as trusted.');
- test (function() {
- for (var i=1; i<coalescedEvents.length; i++)
- assert_greater_than_equal(coalescedEvents[i].timeStamp, coalescedEvents[i-1].timeStamp, 'Time stamps of coalesced events must be ascending.');
- }, expectedPointerType + ' time stamps of coalesced events must be ascending.');
- test (function() {
- for (var i=0; i<coalescedEvents.length; i++) {
- assert_equals(coalescedEvents[i].bubbles, false, 'Bubbles attribute should be false for coalesced events.');
- assert_equals(coalescedEvents[i].cancelable, false, 'Cancelable attribute should be false for coalesced events.');
- }
- }, expectedPointerType + ' pointermove coalesced events should all bubbles and cancelable as false.');
- phase++;
- }
- break;
- case PhaseEnum.WaitingForUp:
- if (eventName == 'pointerup') {
- expect_no_coalesced_events(event, eventName);
- phase++;
- }
- break;
- case PhaseEnum.WaitingForOut:
- if (eventName == 'pointerout') {
- expect_no_coalesced_events(event, eventName);
- phase++;
- }
- break;
- case PhaseEnum.WaitingForLeave:
- if (eventName == 'pointerleave') {
- expect_no_coalesced_events(event, eventName);
- phase++;
- test_pointerEvent.done();
- }
- break;
- }
- });
- });
- }
- </script>
- </head>
- <body onload="run()">
- <h1>Pointer Events coalesced events count and properties</h1>
- <h2 id="pointerTypeDescription"></h2>
- <h4>
- Test Description: This test checks the coalesced events of all types of pointer events.
- <ol>
- <li>Pointer down in the black square and drag inside the black square immediately</li>
- <li>Release the pointer.</li>
- <li>Pointer down in the purple square and drag inside the purple square immediately</li>
- <li>Release the pointer and move out of the purple square</li>
- </ol>
-
- Test passes if the proper behavior of the events is observed.
- </h4>
- <div id="target0"></div>
- <div id="target1" class="touchActionNone"></div>
- <div id="complete-notice">
- <p>The following pointer types were detected: <span id="pointertype-log"></span>.</p>
- <p>Refresh the page to run the tests again with a different pointer type.</p>
- </div>
- </body>
-</html>
-
diff --git a/tests/wpt/web-platform-tests/pointerevents/extension/pointerevent_coalesced_events_attributes.html b/tests/wpt/web-platform-tests/pointerevents/extension/pointerevent_coalesced_events_attributes.html
new file mode 100644
index 00000000000..fa68124c829
--- /dev/null
+++ b/tests/wpt/web-platform-tests/pointerevents/extension/pointerevent_coalesced_events_attributes.html
@@ -0,0 +1,192 @@
+<!doctype html>
+<html>
+ <head>
+ <title>Pointer Events coalesced events count and properties<</title>
+ <meta name="viewport" content="width=device-width">
+ <link rel="stylesheet" type="text/css" href="../pointerevent_styles.css">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/resources/testdriver.js"></script>
+ <script src="/resources/testdriver-actions.js"></script>
+ <script src="/resources/testdriver-vendor.js"></script>
+ <!-- Additional helper script for common checks across event types -->
+ <script type="text/javascript" src="../pointerevent_support.js"></script>
+ <script>
+ var eventList = All_Pointer_Events;
+ PhaseEnum = {
+ WaitingForCancel: 0,
+ WaitingForOver: 1,
+ WaitingForEnter: 2,
+ WaitingForDown: 3,
+ WaitingForMove: 4,
+ WaitingForUp: 5,
+ WaitingForOut: 6,
+ WaitingForLeave: 7,
+ Done: 8,
+ };
+ var phase = PhaseEnum.WaitingForCancel;
+
+ function resetTestState() {
+ phase = PhaseEnum.WaitingForCancel;
+ }
+ function expect_no_coalesced_events(event, eventName) {
+ test(function () {
+ assert_equals(event.getCoalescedEvents().length, 0, eventName + ' should not have any coalesced events');
+ }, expectedPointerType + ' ' + eventName + ' should not have any coalesced events');
+ }
+ function getInViewPoint(element) {
+ var rectangles = element.getClientRects();
+ if (rectangles.length === 0) {
+ return false;
+ }
+
+ var rect = rectangles[0];
+ var left = Math.max(0, rect.left);
+ var right = Math.min(window.innerWidth, rect.right);
+ var top = Math.max(0, rect.top);
+ var bottom = Math.min(window.innerHeight, rect.bottom);
+
+ var x = parseInt(0.5 * (left + right));
+ var y = parseInt(0.5 * (top + bottom));
+
+ return [x, y];
+ }
+ function run() {
+ var test_pointerEvent = setup_pointerevent_test("coalesced events attributes in pointerevents", ['touch']);
+ var target0 = document.getElementById("target0");
+ var target1 = document.getElementById("target1");
+ var actions_promise;
+
+ on_event(target0, 'pointercancel', function (event) {
+ if (phase == PhaseEnum.WaitingForCancel) {
+ expect_no_coalesced_events(event, 'pointercancel');
+ phase++;
+ }
+ });
+ eventList.forEach(function(eventName) {
+ on_event(target1, eventName, function (event) {
+ switch (phase) {
+ case PhaseEnum.WaitingForOver:
+ if (eventName == 'pointerover') {
+ expect_no_coalesced_events(event, eventName);
+ phase++;
+ }
+ break;
+ case PhaseEnum.WaitingForEnter:
+ if (eventName == 'pointerenter') {
+ expect_no_coalesced_events(event, eventName);
+ phase++;
+ }
+ break;
+ case PhaseEnum.WaitingForDown:
+ if (eventName == 'pointerdown') {
+ expect_no_coalesced_events(event, eventName);
+ phase++;
+ step_timeout(function(){
+ // This is just a way to block the main thread.
+ var current = new Date().getTime();
+ for (; new Date().getTime() - current < 500;);
+ }, 0);
+ }
+ break;
+ case PhaseEnum.WaitingForMove:
+ if (eventName == 'pointermove') {
+ var coalescedEvents = event.getCoalescedEvents();
+ test (function() {
+ assert_greater_than(event.getCoalescedEvents().length, 1, 'pointermove should have at least 2 coalesced events.');
+ }, expectedPointerType + ' pointermove should have >2 coalesced events as main thread is busy.');
+ test (function() {
+ for (var i=0; i<coalescedEvents.length; i++) {
+ assert_equals(coalescedEvents[i].isTrusted, true, 'isTrusted flag should be true for coalesced events.');
+ if (i > 0)
+ assert_greater_than_equal(coalescedEvents[i].timeStamp, coalescedEvents[i-1].timeStamp, 'Time stamps of coalesced events must be ascending.');
+ }
+ }, expectedPointerType + ' pointermove coalesced events should all be marked as trusted.');
+ test (function() {
+ for (var i=1; i<coalescedEvents.length; i++)
+ assert_greater_than_equal(coalescedEvents[i].timeStamp, coalescedEvents[i-1].timeStamp, 'Time stamps of coalesced events must be ascending.');
+ }, expectedPointerType + ' time stamps of coalesced events must be ascending.');
+ test (function() {
+ for (var i=0; i<coalescedEvents.length; i++) {
+ assert_equals(coalescedEvents[i].bubbles, false, 'Bubbles attribute should be false for coalesced events.');
+ assert_equals(coalescedEvents[i].cancelable, false, 'Cancelable attribute should be false for coalesced events.');
+ }
+ }, expectedPointerType + ' pointermove coalesced events should all bubbles and cancelable as false.');
+ phase++;
+ }
+ break;
+ case PhaseEnum.WaitingForUp:
+ if (eventName == 'pointerup') {
+ expect_no_coalesced_events(event, eventName);
+ phase++;
+ }
+ break;
+ case PhaseEnum.WaitingForOut:
+ if (eventName == 'pointerout') {
+ expect_no_coalesced_events(event, eventName);
+ phase++;
+ }
+ break;
+ case PhaseEnum.WaitingForLeave:
+ if (eventName == 'pointerleave') {
+ expect_no_coalesced_events(event, eventName);
+ phase++;
+ actions_promise.then( () => {
+ test_pointerEvent.done();
+ });
+ }
+ break;
+ }
+ });
+ });
+
+ // Inject touch inputs.
+ var elementPoint1 = getInViewPoint(target0);
+ var x1 = elementPoint1[0];
+ var y1 = elementPoint1[1];
+ var elementPoint2 = getInViewPoint(target1);
+ var x2 = elementPoint2[0];
+ var y2 = elementPoint2[1];
+ actions_promise = new test_driver.Actions(0)
+ .addPointer("touchPointer1", "touch")
+ .pointerMove(x1, y1)
+ .pointerDown()
+ .pointerMove(x1 + 10, y1)
+ .pointerMove(x1 + 20, y1)
+ .pointerMove(x1 + 30, y1)
+ .addTick(20)
+ .pointerUp()
+ .pointerMove(x2, y2)
+ .pointerDown()
+ .pointerMove(x2 + 10, y2)
+ .pointerMove(x2 + 20, y2)
+ .pointerMove(x2 + 30, y2)
+ .addTick(20)
+ .pointerUp()
+ .send();
+ }
+ </script>
+ </head>
+ <body onload="run()">
+ <h1>Pointer Events coalesced events count and properties</h1>
+ <h2 id="pointerTypeDescription"></h2>
+ <h4>
+ Test Description: This test checks the coalesced events of all types of pointer events.
+ <ol>
+ <li>Pointer down in the black square and drag inside the black square immediately</li>
+ <li>Release the pointer.</li>
+ <li>Pointer down in the purple square and drag inside the purple square immediately</li>
+ <li>Release the pointer and move out of the purple square</li>
+ </ol>
+
+ Test passes if the proper behavior of the events is observed.
+ </h4>
+ <div id="target0"></div>
+ <div id="target1" class="touchActionNone"></div>
+ <div id="complete-notice">
+ <p>The following pointer types were detected: <span id="pointertype-log"></span>.</p>
+ <p>Refresh the page to run the tests again with a different pointer type.</p>
+ </div>
+ </body>
+</html>
+
diff --git a/tests/wpt/web-platform-tests/pointerevents/extension/pointerevent_pointerrawupdate.html b/tests/wpt/web-platform-tests/pointerevents/extension/pointerevent_pointerrawupdate.html
index 0d317010621..0f46583c9b5 100644
--- a/tests/wpt/web-platform-tests/pointerevents/extension/pointerevent_pointerrawupdate.html
+++ b/tests/wpt/web-platform-tests/pointerevents/extension/pointerevent_pointerrawupdate.html
@@ -20,6 +20,7 @@
<div id="target0"></div>
<script>
var test_pointerrawupdate = async_test("pointerrawupdate event received");
+ var actions_promise;
var pointerrawupdateReceived = false;
var pointerdownReceived = false;
@@ -47,10 +48,13 @@
assert_true(pointerrawupdateFromButtonChangeReceived,
"Pointerrawupdate event should have been received from chorded button changes.");
}, "Pointerrawupdate event should have been received from chorded button changes.");
- test_pointerrawupdate.done();
+ // Make sure the test finishes after all the input actions are completed.
+ actions_promise.then( () => {
+ test_pointerrawupdate.done();
+ });
});
var actions = new test_driver.Actions();
- actions.pointerMove(0, 0, {origin: target0, button: actions.ButtonType.LEFT})
+ actions_promise = actions.pointerMove(0, 0, {origin: target0, button: actions.ButtonType.LEFT})
.pointerDown({button: actions.ButtonType.LEFT})
.pointerDown({button: actions.ButtonType.MIDDLE})
.pointerUp({button: actions.ButtonType.MIDDLE})
diff --git a/tests/wpt/web-platform-tests/pointerevents/pointerevent_pointercancel_touch.html b/tests/wpt/web-platform-tests/pointerevents/pointerevent_pointercancel_touch.html
index a645033a247..b09ddd740a6 100644
--- a/tests/wpt/web-platform-tests/pointerevents/pointerevent_pointercancel_touch.html
+++ b/tests/wpt/web-platform-tests/pointerevents/pointerevent_pointercancel_touch.html
@@ -31,10 +31,10 @@
var pointerdown_event = null;
var pointercancel_event = null;
- var received_pointerleave = false;
function run() {
var target0 = document.getElementById("target0");
+ var actions_promise;
on_event(target0, "pointerdown", function (event) {
pointerdown_event = event;
@@ -68,16 +68,14 @@
assert_equals(event.pointerType, pointerdown_event.pointerType, "pointerType should be the same for pointerleave and pointercancel");
assert_equals(event.isPrimary, pointerdown_event.isPrimary, "isPrimary should be the same for pointerleave and pointercancel");
});
- received_pointerleave = true;
- });
-
- // Inject touch inputs and wait for all the actions finish to end the test.
- touchScrollInTarget(target0, 'down').then(function() {
- test_pointerEvent.step(function () {
- assert_true(received_pointerleave, "pointerleave should be received before the test finished");
+ // Make sure the test finishes after all the input actions are completed.
+ actions_promise.then( () => {
+ test_pointerEvent.done();
});
- test_pointerEvent.done();
});
+
+ // Inject touch inputs.
+ actions_promise = touchScrollInTarget(target0, 'down');
}
</script>
<h1>Pointer Events pointercancel Tests</h1>
diff --git a/tests/wpt/web-platform-tests/pointerevents/pointerevent_pointerleave_after_pointercancel_touch.html b/tests/wpt/web-platform-tests/pointerevents/pointerevent_pointerleave_after_pointercancel_touch.html
index 555e5feb010..8425667a104 100644
--- a/tests/wpt/web-platform-tests/pointerevents/pointerevent_pointerleave_after_pointercancel_touch.html
+++ b/tests/wpt/web-platform-tests/pointerevents/pointerevent_pointerleave_after_pointercancel_touch.html
@@ -24,12 +24,12 @@
// will fail unless the async_test is created with the var name "test_pointerEvent".
add_completion_callback(showPointerTypes);
- var eventTested = false;
var pointercancel_event = null;
var detected_pointertypes = {};
function run() {
var target0 = document.getElementById("target0");
+ var actions_promise;
on_event(target0, "pointercancel", function (event) {
detected_pointertypes[event.pointerType] = true;
@@ -41,13 +41,14 @@
on_event(target0, "pointerleave", function (event) {
if(event.pointerType == 'touch') {
if(pointercancel_event != null) {
- if(eventTested == false) {
- test_pointerleave.step(function() {
- assert_equals(event.pointerType, pointercancel_event.pointerType, "pointerType is same for pointercancel and pointerleave");
- assert_equals(event.isPrimary, pointercancel_event.isPrimary, "isPrimary is same for pointercancel and pointerleave");
- });
- eventTested = true;
- }
+ test_pointerleave.step(function() {
+ assert_equals(event.pointerType, pointercancel_event.pointerType, "pointerType is same for pointercancel and pointerleave");
+ assert_equals(event.isPrimary, pointercancel_event.isPrimary, "isPrimary is same for pointercancel and pointerleave");
+ });
+ // Make sure the test finishes after all the input actions are completed.
+ actions_promise.then( () => {
+ test_pointerleave.done();
+ });
}
else {
test_pointerleave.step(function() {
@@ -57,13 +58,8 @@
}
});
- // Inject touch inputs and wait for all the actions finish to end the test.
- touchScrollInTarget(target0, 'down').then(function() {
- test_pointerleave.step(function () {
- assert_true(eventTested, "pointerleave should be received before the test finishes");
- }, "pointerleave should be received before the test finishes");
- test_pointerleave.done();
- });
+ // Inject touch inputs.
+ actions_promise = touchScrollInTarget(target0, 'down');
}
</script>
diff --git a/tests/wpt/web-platform-tests/pointerevents/pointerevent_pointerout_after_pointercancel_touch.html b/tests/wpt/web-platform-tests/pointerevents/pointerevent_pointerout_after_pointercancel_touch.html
index 13e7ffaebc1..782289384ab 100644
--- a/tests/wpt/web-platform-tests/pointerevents/pointerevent_pointerout_after_pointercancel_touch.html
+++ b/tests/wpt/web-platform-tests/pointerevents/pointerevent_pointerout_after_pointercancel_touch.html
@@ -24,12 +24,12 @@
// will fail unless the async_test is created with the var name "test_pointerEvent".
add_completion_callback(showPointerTypes);
- var eventTested = false;
var pointercancel_event = null;
var detected_pointertypes = {};
function run() {
var target0 = document.getElementById("target0");
+ var actions_promise;
on_event(target0, "pointercancel", function (event) {
detected_pointertypes[event.pointerType] = true;
@@ -41,13 +41,14 @@
on_event(target0, "pointerout", function (event) {
if(event.pointerType == 'touch') {
if(pointercancel_event != null) {
- if (eventTested == false) {
- test_pointerout.step(function() {
- assert_equals(event.pointerType, pointercancel_event.pointerType, "pointerType is same for pointercancel and pointerout");
- assert_equals(event.isPrimary, pointercancel_event.isPrimary, "isPrimary is same for pointercancel and pointerout");
- });
- eventTested = true;
- }
+ test_pointerout.step(function() {
+ assert_equals(event.pointerType, pointercancel_event.pointerType, "pointerType is same for pointercancel and pointerout");
+ assert_equals(event.isPrimary, pointercancel_event.isPrimary, "isPrimary is same for pointercancel and pointerout");
+ });
+ // Make sure the test finishes after all the input actions are completed.
+ actions_promise.then( () => {
+ test_pointerout.done();
+ });
}
else {
test_pointerout.step(function() {
@@ -58,13 +59,8 @@
}
});
- // Inject touch inputs and wait for all the actions finish to end the test.
- touchScrollInTarget(target0, 'down').then(function() {
- test_pointerout.step(function () {
- assert_true(eventTested, "pointerout should be received before the test finishes");
- }, "pointerout should be received before the test finishes");
- test_pointerout.done();
- });
+ // Inject touch inputs.
+ actions_promise = touchScrollInTarget(target0, 'down');
}
</script>
diff --git a/tests/wpt/web-platform-tests/pointerevents/pointerevent_releasepointercapture_events_to_original_target.html b/tests/wpt/web-platform-tests/pointerevents/pointerevent_releasepointercapture_events_to_original_target.html
index 12e31cdb234..6f6d30e16e1 100644
--- a/tests/wpt/web-platform-tests/pointerevents/pointerevent_releasepointercapture_events_to_original_target.html
+++ b/tests/wpt/web-platform-tests/pointerevents/pointerevent_releasepointercapture_events_to_original_target.html
@@ -22,6 +22,8 @@
var outLeaveEventsFail = false;
var f_gotPointerCapture = false;
var f_lostPointerCapture = false;
+ var index = 0;
+ var actions_promise;
function resetTestState() {
captured_event = null;
@@ -98,7 +100,16 @@
});
if (event.type == "pointerup") {
test_done = true;
- test_pointerEvent.done(); // complete test
+ // Make sure the test finishes after all the input actions are completed.
+ actions_promise.then( () => {
+ if (index == 0) {
+ actions_promise = pointerDragInTarget('touch', target0, 'right');
+ } else if (index == 1) {
+ actions_promise = pointerDragInTarget('pen', target0, 'right');
+ }
+ index++;
+ test_pointerEvent.done();
+ });
}
}
}
@@ -116,11 +127,7 @@
}
// Inject pointer inputs.
- pointerDragInTarget('mouse', target0, 'right').then(function() {
- return pointerDragInTarget('touch', target0, 'right');
- }).then(function() {
- return pointerDragInTarget('pen', target0, 'right');
- });
+ actions_promise = pointerDragInTarget('mouse', target0, 'right');
}
</script>
</head>
diff --git a/tests/wpt/web-platform-tests/pointerevents/pointerevent_releasepointercapture_onpointercancel_touch.html b/tests/wpt/web-platform-tests/pointerevents/pointerevent_releasepointercapture_onpointercancel_touch.html
index 493236150dd..c54ee2a9d4e 100644
--- a/tests/wpt/web-platform-tests/pointerevents/pointerevent_releasepointercapture_onpointercancel_touch.html
+++ b/tests/wpt/web-platform-tests/pointerevents/pointerevent_releasepointercapture_onpointercancel_touch.html
@@ -25,13 +25,13 @@
<script type='text/javascript'>
var pointercancelGot = false;
- var lostpointercaptureGot = false;
var count=0;
var event_log = [];
var detected_pointertypes = {};
var test_pointerEvent = async_test("pointer capture is released on pointercancel");
var target0 = document.getElementById('target0');
+ var actions_promise;
add_completion_callback(end_of_test);
function end_of_test() {
@@ -61,7 +61,10 @@
test_pointerEvent.step(function () {
assert_true(pointercancelGot, "pointercancel was received before lostpointercapture");
});
- lostpointercaptureGot = true;
+ // Make sure the test finishes after all the input actions are completed.
+ actions_promise.then( () => {
+ test_pointerEvent.done();
+ });
});
on_event(target0, 'pointercancel', function(e) {
@@ -69,13 +72,8 @@
pointercancelGot = true;
});
- // Inject touch inputs and wait for all the actions finish to end the test.
- touchScrollInTarget(target0, 'down').then(function() {
- test_pointerEvent.step(function () {
- assert_true(lostpointercaptureGot, "lostpointercapture should be received before the test finishes");
- }, "lostpointercapture should be received before the test finishes");
- test_pointerEvent.done();
- });
+ // Inject touch inputs.
+ actions_promise = touchScrollInTarget(target0, 'down');
}
</script>
<h1>Pointer Events Capture Test</h1>
diff --git a/tests/wpt/web-platform-tests/pointerevents/pointerevent_sequence_at_implicit_release_on_click.html b/tests/wpt/web-platform-tests/pointerevents/pointerevent_sequence_at_implicit_release_on_click.html
index 0c6e2c532f9..4b424f27643 100644
--- a/tests/wpt/web-platform-tests/pointerevents/pointerevent_sequence_at_implicit_release_on_click.html
+++ b/tests/wpt/web-platform-tests/pointerevents/pointerevent_sequence_at_implicit_release_on_click.html
@@ -16,6 +16,8 @@
var detected_pointertypes = {};
var event_log = [];
var start_logging = false;
+ var actions_promise;
+ var index = 0;
function resetTestState() {
detected_eventTypes = {};
@@ -31,7 +33,20 @@
var expected_events = "pointerup, lostpointercapture, pointerout, pointerleave";
assert_equals(event_log.join(", "), expected_events);
});
- test_pointer_event.done();
+ // Make sure the test finishes after all the input actions are completed.
+ actions_promise.then( () => {
+ if (index == 0) {
+ actions_promise = clickInTarget("touch", target).then(function() {
+ return clickInTarget("touch", button);
+ });
+ } else if (index == 1) {
+ actions_promise = clickInTarget("pen", target).then(function() {
+ return clickInTarget("pen", button);
+ });
+ }
+ index++;
+ test_pointer_event.done();
+ });
});
var target = document.getElementById("target");
@@ -54,16 +69,8 @@
});
// Inject pointer inputs.
- clickInTarget("mouse", target).then(function() {
+ actions_promise = clickInTarget("mouse", target).then(function() {
return clickInTarget("mouse", button);
- }).then(function() {
- return clickInTarget("touch", target);
- }).then(function() {
- return clickInTarget("touch", button);
- }).then(function() {
- return clickInTarget("pen", target);
- }).then(function() {
- return clickInTarget("pen", button);
});
}
</script>
diff --git a/tests/wpt/web-platform-tests/pointerevents/pointerevent_setpointercapture_inactive_button_mouse.html b/tests/wpt/web-platform-tests/pointerevents/pointerevent_setpointercapture_inactive_button_mouse.html
index 7d0b00d47bc..fa9a5fb3c5b 100644
--- a/tests/wpt/web-platform-tests/pointerevents/pointerevent_setpointercapture_inactive_button_mouse.html
+++ b/tests/wpt/web-platform-tests/pointerevents/pointerevent_setpointercapture_inactive_button_mouse.html
@@ -32,16 +32,19 @@
function run() {
var target0 = document.getElementById("target0");
+ var actions_promise;
on_event(target0, "pointerover", function (event) {
detected_pointertypes[event.pointerType] = true;
target0.setPointerCapture(event.pointerId);
// After we receive a pointerover event, dispatch a pointer move to move out of target0.
- new test_driver.Actions().pointerMove(0, 0).send();
+ actions_promise.then(function() {
+ return new test_driver.Actions().pointerMove(0, 0).send();
+ });
});
// First dispatch a pointer move to target0.
- new test_driver.Actions().pointerMove(0, 0, {origin: target0}).send();
+ actions_promise = new test_driver.Actions().pointerMove(0, 0, {origin: target0}).send();
// When the setPointerCapture method is invoked, if the specified pointer is not in active button state, then the method must have no effect on subsequent pointer events.
// TA: 13.2
@@ -49,7 +52,10 @@
test(function() {
assert_false(captureGot, "pointer capture is not set while button state is inactive")
}, "pointer capture is not set while button state is inactive");
- done();
+ // Make sure the test finishes after all the input actions are completed.
+ actions_promise.then( () => {
+ done();
+ });
});
on_event(target0, 'gotpointercapture', function(e) {
diff --git a/tests/wpt/web-platform-tests/pointerevents/pointerevent_suppress_compat_events_on_click.html b/tests/wpt/web-platform-tests/pointerevents/pointerevent_suppress_compat_events_on_click.html
index 341a82d97a8..2f99e7a976a 100644
--- a/tests/wpt/web-platform-tests/pointerevents/pointerevent_suppress_compat_events_on_click.html
+++ b/tests/wpt/web-platform-tests/pointerevents/pointerevent_suppress_compat_events_on_click.html
@@ -15,6 +15,7 @@
<script type="text/javascript">
var test_pointerEvent = async_test("Suppress compat mouse events on click");
add_completion_callback(end_of_test);
+ var actions_promise;
var detected_pointertypes = {};
var event_log = [];
@@ -30,11 +31,15 @@
"click@target0, mousedown@target1, mouseup@target1, click@target1");
}, "Event log");
- test_pointerEvent.done(); // complete test
+ // Make sure the test finishes after all the input actions are completed.
+ actions_promise.then( () => {
+ test_pointerEvent.done();
+ });
}
function run() {
- on_event(document.getElementById("done"), "click", end_of_interaction);
+ var targetDone = document.getElementById('done');
+ on_event(targetDone, "click", end_of_interaction);
var target_list = ["target0", "target1"];
var pointer_event_list = ["pointerdown"];
@@ -65,10 +70,7 @@
});
// Inject mouse inputs.
- var target0 = document.getElementById('target0');
- var target1 = document.getElementById('target1');
- var targetDone = document.getElementById('done');
- new test_driver.Actions()
+ actions_promise = new test_driver.Actions()
.pointerMove(0, 0, {origin: target0})
.pointerDown()
.pointerUp()
diff --git a/tests/wpt/web-platform-tests/pointerevents/pointerevent_suppress_compat_events_on_drag_mouse.html b/tests/wpt/web-platform-tests/pointerevents/pointerevent_suppress_compat_events_on_drag_mouse.html
index 6ed75ab4cbc..6ed19c24678 100644
--- a/tests/wpt/web-platform-tests/pointerevents/pointerevent_suppress_compat_events_on_drag_mouse.html
+++ b/tests/wpt/web-platform-tests/pointerevents/pointerevent_suppress_compat_events_on_drag_mouse.html
@@ -15,6 +15,7 @@
<script type="text/javascript">
var test_pointerEvent = async_test("Suppress compat mouse events on drag");
add_completion_callback(end_of_test);
+ var actions_promise;
var detected_pointertypes = {};
var event_log = [];
@@ -37,11 +38,15 @@
"mousedown@target1, mousemove@target1, mouseup@target1");
}, "Event log");
- test_pointerEvent.done(); // complete test
+ // Make sure the test finishes after all the input actions are completed.
+ actions_promise.then( () => {
+ test_pointerEvent.done();
+ });
}
function run() {
- on_event(document.getElementById("done"), "click", end_of_interaction);
+ var targetDone = document.getElementById('done');
+ on_event(targetDone, "click", end_of_interaction);
var target_list = ["target0", "target1"];
var pointer_event_list = ["pointerdown" , "pointermove", "pointerup"];
@@ -79,10 +84,7 @@
});
// Inject mouse inputs.
- var target0 = document.getElementById('target0');
- var target1 = document.getElementById('target1');
- var targetDone = document.getElementById('done');
- new test_driver.Actions()
+ actions_promise = new test_driver.Actions()
.pointerMove(0, 0, {origin: target0})
.pointerDown()
.pointerMove(10, 0, {origin: target0})
diff --git a/tests/wpt/web-platform-tests/pointerevents/pointerevent_touch-action-inherit_child-pan-x-child-pan-y_touch.html b/tests/wpt/web-platform-tests/pointerevents/pointerevent_touch-action-inherit_child-pan-x-child-pan-y_touch.html
index 704b4188979..99677313de5 100644
--- a/tests/wpt/web-platform-tests/pointerevents/pointerevent_touch-action-inherit_child-pan-x-child-pan-y_touch.html
+++ b/tests/wpt/web-platform-tests/pointerevents/pointerevent_touch-action-inherit_child-pan-x-child-pan-y_touch.html
@@ -92,7 +92,7 @@
function run() {
var target0 = document.getElementById("target0");
var btnComplete = document.getElementById("btnComplete");
- var clickIsReceived = false;
+ var actions_promise;
// Check if touch-action attribute works properly for embedded divs
// Scrollable-Parent, Child: `pan-x`, Grand-Child: `pan-y`
@@ -103,7 +103,10 @@
assert_equals(target0.scrollLeft, 0, "scroll x offset should be 0 in the end of the test");
assert_equals(target0.scrollTop, 0, "scroll y offset should be 0 in the end of the test");
});
- clickIsReceived = true;
+ // Make sure the test finishes after all the input actions are completed.
+ actions_promise.then( () => {
+ test_touchaction.done();
+ });
updateDescriptionComplete();
});
@@ -112,15 +115,10 @@
});
// Inject touch inputs.
- touchScrollInTarget(scrollTarget, 'down').then(function() {
+ actions_promise = touchScrollInTarget(scrollTarget, 'down').then(function() {
return touchScrollInTarget(scrollTarget, 'right');
}).then(function() {
return clickInTarget("touch", btnComplete);
- }).then(function() {
- test_touchaction.step(function () {
- assert_true(clickIsReceived, "click should be received before the test finishes");
- }, "click should be received before the test finishes");
- test_touchaction.done();
});
}
</script>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..3d09f39410b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..9c7a9245ae8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..4be57de2755
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..6f4cebe3ee7
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..2dc8bbae43b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..fca7e959656
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..a7abfde5e55
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..414983622a1
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..4e534a9c753
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..af8dba9f66f
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..131dc9a4c0b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..48eee6b1da7
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..724c507b481
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-http.keep-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to cross-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..6f86a5bd304
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-http.no-redirect.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to cross-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..4933e9c413e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-http.swap-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to cross-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..cf55249cd7d
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-https.keep-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to cross-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..c5233ad7fda
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-https.no-redirect.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to cross-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..53098fb5eef
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-https.swap-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to cross-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..4e8d4a9c9c3
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-http.keep-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..e03ea85dfb9
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-http.no-redirect.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..2e7836a1b2f
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-http.swap-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to same-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..4e91d52fd05
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-https.keep-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to same-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..1943c0909bf
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-https.no-redirect.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to same-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..489c3e799b7
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-https.swap-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to same-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..65eba084020
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..37f4e008b35
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..369c8a5c0b2
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..d2a864a064f
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..d6459820a28
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..ecbf180b4c2
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..9a4124ccb67
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..40104428e2e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..b885d9457bc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-http.swap-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..8cac3b45fb5
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-https.keep-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..500f3f39a95
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-https.no-redirect.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..0c6e5e90a6c
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-https.swap-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..79b4f65accf
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-http.keep-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..df734f1e60c
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-http.no-redirect.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..70fd1c97d13
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-http.swap-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..82b9c0f3310
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-https.keep-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..001ad080c57
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-https.no-redirect.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..4bf38ace3e1
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-https.swap-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..2e72613575a
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-http.keep-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..597c2f6c778
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-http.no-redirect.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..038d63c730e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-http.swap-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..f4c5190091e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-https.keep-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..c6a4a9508de
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-https.no-redirect.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..9880f160057
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-https.swap-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..656cf35626b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-http.keep-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to cross-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..be66cf93211
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: same-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..9639c199a56
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-http.no-redirect.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to cross-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..be66cf93211
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: same-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..5dd7ddacfc1
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-http.swap-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to cross-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..be66cf93211
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: same-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..26bf3130322
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-https.keep-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to cross-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..be66cf93211
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: same-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..f9fd0b0b036
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-https.no-redirect.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to cross-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..be66cf93211
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: same-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..818b0816c24
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-https.swap-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to cross-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..be66cf93211
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: same-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..166d53adff3
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-http.keep-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..be66cf93211
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: same-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..d91a2e81636
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-http.no-redirect.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..be66cf93211
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: same-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..ba587f84dbf
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-http.swap-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to same-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..be66cf93211
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: same-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..f386befc6eb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-https.swap-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to same-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..be66cf93211
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: same-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..27d8de6246d
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..b914efdc87c
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..bfd6f1c3f47
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..0e9935af62a
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..5d7e1268e19
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..11a717d4725
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..8b36d15a3fd
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..f1158b0cf48
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..da39661bcbf
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-http.swap-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..d9fe8e19770
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-https.keep-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..26154b93ecf
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-https.no-redirect.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..eea93a2d5c2
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-https.swap-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..129d0344bd8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-http.keep-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..df2cec8fc86
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-http.no-redirect.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..91e9d03c545
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-http.swap-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..5820a30aa69
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-https.keep-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..008db741e3b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-https.no-redirect.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..6512f2a1ec3
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-https.swap-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..773b18c0a5a
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-http.keep-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..073133aaa2b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-http.no-redirect.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..121c4e97b67
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-http.swap-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..c5869dc778c
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-https.keep-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..85fc13eab52
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-https.no-redirect.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..bd74c1f3600
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-https.swap-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..8816e074d98
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..b24b847bd60
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..7e30815d9b6
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..b44447b143e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..2fb45874a1a
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..8a075efa087
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..a2108d0858d
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..ba8e55344ab
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..b1aec995339
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..b8676f6fcb2
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..c4d1fec0f76
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..48ae72274dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..3b5c6087ca7
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-http.keep-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..777b6de1ef0
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-http.no-redirect.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..ddb55bb3adf
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-http.swap-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..c663c209767
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-https.keep-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..5d7b3c94250
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-https.no-redirect.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..0eb10a224b4
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-https.swap-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..e413286edeb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/same-http.keep-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..5e2e08f3a75
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/same-http.no-redirect.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..433bae3c5bb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/same-http.swap-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..762b46f345f
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/same-https.keep-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..27e5f716b3a
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/same-https.no-redirect.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..687598c5f55
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/same-https.swap-origin.http.html
@@ -0,0 +1,39 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [
+ {
+ "policyDeliveries": [],
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..0b035d26e38
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..dec56bc9a0d
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..64cd66eac68
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..15e60b67956
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..c0d07f85854
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..e53ac512441
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..cd75aa203eb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..9be0bf3fadd
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..4c3708d687f
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..bf27bb46161
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..5a9c1cdf386
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..c424f516c3b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..67f97ec87be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..54429d45e45
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..b756a252c44
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..41916d9334f
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..b1601e51a5f
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..f70ca471457
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..b4f87226182
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..078d1f15e0c
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..da81f5061c6
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..aa7f4bda7ed
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..9ee83c852c9
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..cb6e6ff16bd
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..282c1793384
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..8cf052f45be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..15fd0d762a1
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..6c724928524
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..8b2487bc3c1
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..97857ee903a
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..a5d151a9eb4
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..b07400aa18a
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..dd3bea4a79b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..485b6592c14
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..861b00b2d91
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..480f7f1a970
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..7df7be8a530
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..f40eaddf0f9
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..aec116e896b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..89a479c00e6
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..2414af93892
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..0dda649cd20
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..73a715bbcc4
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..b858e2be2cc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..cdd4ddf4ce4
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..b7836bba091
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..855006c31d9
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..eceeb454721
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..024396c44f3
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "sharedworker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..a047bf3477b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "sharedworker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..ba9982d8e7c
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..c7de2e6f0f2
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..2884fcab6ef
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-module",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..31046accc27
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-module",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..fd4d4237c0d
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..262d8d249c4
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..819e7d249b0
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..5bb5c513682
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..558c333c2c3
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..0bdeb265ae9
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..fe36ce6c7fa
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..9631d04e259
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..c9d2e50d8c9
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..6d85d0baea2
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..6586f1ffe24
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..2e98a643347
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..180358e691b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer-when-downgrade
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..408834c03d7
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..a2f92d657a5
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..51c29e644d9
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..d0725a2557a
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..c33acb3704a
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..48c549827f6
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/cross-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..853b7ef4836
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for fetch to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..9d4cac3345e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for fetch to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..c89a33c4635
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/same-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for fetch to same-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/same-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/same-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..3db4fa975f0
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/same-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for fetch to same-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/same-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/same-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..29f691c70ff
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/same-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for fetch to same-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/same-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/same-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..7e279445157
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/same-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for fetch to same-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/same-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/fetch/same-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..e7c08bbcaf9
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..69607cb0778
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..d7d0ba3b381
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..47c57013f44
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..4e3bb1a06fd
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..5a7ab10c413
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/cross-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..7f1d12f1079
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..1b06a5a9545
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..e6c56b11744
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to same-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..ddec0c50687
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to same-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..3bef6b38ae8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to same-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..c355cc7b41e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to same-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/iframe-tag/same-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..044a0013137
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to cross-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..bdb0050f728
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to cross-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..02a0f736459
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to cross-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..552e0de05df
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to cross-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..99bf6df0357
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to cross-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..bf2fd15f642
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to cross-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/cross-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..8ba7fc0528c
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..200e236256b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..9390f89ac8c
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to same-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..ea628172c34
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to same-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..98937d42ace
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to same-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..0f5a13efe12
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to same-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/img-tag/same-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..8045577914e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..db12593a432
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..1c276c8fdbb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..47f19e9573c
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..b7aa32c2f57
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..c2b727e575a
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/cross-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..464eb4cd1b8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..1ac4dfe81db
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..9d133b182e1
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to same-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..86255c2a239
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to same-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..0d852928863
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to same-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..734134e44fe
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to same-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/script-tag/same-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/sharedworker-classic/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..6aeed041c1d
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/sharedworker-classic/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for sharedworker-classic to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "sharedworker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/sharedworker-classic/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/sharedworker-classic/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/sharedworker-classic/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/sharedworker-classic/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..c3825ec079c
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/sharedworker-classic/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for sharedworker-classic to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "sharedworker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/sharedworker-classic/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/sharedworker-classic/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/sharedworker-classic/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/worker-classic/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..db76379cc9f
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/worker-classic/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for worker-classic to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/worker-classic/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/worker-classic/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/worker-classic/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/worker-classic/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..f71ac8e8f40
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/worker-classic/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for worker-classic to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/worker-classic/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/worker-classic/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/worker-classic/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/worker-module/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..b0be8268545
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/worker-module/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for worker-module to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-module",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/worker-module/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/worker-module/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/worker-module/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/worker-module/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..475110a72fc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/worker-module/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for worker-module to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-module",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/worker-module/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/worker-module/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/worker-module/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..cfe73628d05
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..17c0bd59f0d
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..a7b975cd619
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..7fff66d3a49
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..9d1fe345515
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..9edc5d8ab07
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/cross-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..43f324a85c9
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for xhr to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..22709fed295
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for xhr to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..25009254d8e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/same-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for xhr to same-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/same-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/same-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..6be0685716c
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/same-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for xhr to same-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/same-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/same-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..52b9fc83154
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/same-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for xhr to same-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/same-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/same-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..ef75493d593
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/same-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for xhr to same-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/same-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..b3b55087edb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/xhr/same-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: no-referrer
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..75f4815eb6b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..37756d8c5be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..3ca0ed8c850
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..8090e7ed378
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..39c7104194e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..edd61515cb3
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..6272ff9bdcf
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..dca65f1663a
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..a262455d5cb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..586a69b543e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..f25400a4268
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..ef1fcf8da02
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/fetch/same-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..f2553d67ff4
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..be21cda94d5
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..477481d955f
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..7c74c301a92
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..b83ae5afb16
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..3b87e0e1ee4
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..b34218514f0
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..7b9551f94f9
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..b3c8f8bc7b7
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..e3549e3092e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..86d8dc5a296
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..e676ab91424
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..ed27eab67b0
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..a4f111ba329
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..23dbc764034
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..b09a25e8006
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..40453628c96
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..548a99f10bc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..ae909bd8684
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..4bb4990a18c
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..45781d6ccd8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..99a9367616d
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..23f279f394a
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..a2197378de8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/img-tag/same-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..cc79bca168c
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..1a877c7a62f
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..820c56c2990
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..64764c8002c
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..310e2242d2d
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..755cb361f23
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..d4d2b40461c
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..55235947114
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..e82ea504715
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..c0009b6a50a
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..82af386aad9
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..c77c8f20211
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/script-tag/same-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..47ef7569831
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "sharedworker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..12f851e769b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "sharedworker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..5cfd674ea22
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..04f454b3877
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..655c76f1c03
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-module",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..0106b3154b8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-module",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..357cefe6efb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..25a6a3c9791
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..617947e662c
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..4eaee8e8e4d
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..57e98ebc915
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..821f46b4016
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/cross-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..1ae656ab508
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..d95dfa1fd2c
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..e0d685b6fc9
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..09f77e2adab
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..3ed876f46d4
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..48babe4a998
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..a15ea7c65c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/xhr/same-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..6cbfb06d497
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/cross-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/cross-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/cross-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..6bd5806921b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/cross-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/cross-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/cross-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..250185ba9f4
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/cross-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/cross-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/cross-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..b66c4da0baf
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/cross-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/cross-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/cross-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..40a04d29f88
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/cross-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/cross-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/cross-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..eb1a8f79619
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/cross-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/cross-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/cross-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..e3569f1d503
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..1d138fae4c4
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..092fec8239c
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/same-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/same-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/same-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..7202a43af1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/same-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/same-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/same-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..199f948f395
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/same-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/same-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/same-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..e254d58d35f
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/same-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/same-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/fetch/same-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..0044911c2d8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..fd06406bc98
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..e3ac6f648e3
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..78b5cfa3bb9
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..86cf62f479d
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..58ff33f8024
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/cross-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..51910edd9d3
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..3432542251d
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..f0827d96efb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/same-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/same-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/same-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..a9fc93d6b54
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/same-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/same-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/same-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..eaf0c719cdf
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/same-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/same-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/same-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..72264666b13
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/same-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/same-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/iframe-tag/same-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..16ea22743cb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/cross-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/cross-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/cross-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..eb9dcf78318
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/cross-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/cross-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/cross-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..1872a9310f7
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/cross-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/cross-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/cross-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..7cb2e58c22f
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/cross-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/cross-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/cross-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..5993c1a4dc4
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/cross-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/cross-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/cross-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..2a00f3c6fdc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/cross-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/cross-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/cross-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..f41dd8ed255
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..23f60063607
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..17e0f040996
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/same-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/same-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/same-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..3c0453f8617
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/same-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/same-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/same-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..9d0609167f1
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/same-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/same-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/same-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..6c00fd9985f
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/same-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/same-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/img-tag/same-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..5bee1774b3f
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/cross-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/cross-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/cross-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..580b42e0c99
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/cross-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/cross-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/cross-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..413b20aa2bd
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/cross-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/cross-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/cross-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..29f367a04e8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/cross-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/cross-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/cross-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..d2c5bfc2bfc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/cross-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/cross-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/cross-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..63670d98597
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/cross-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/cross-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/cross-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..1b150f1cf65
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..3b8b1ced900
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..bfdb519d4b4
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/same-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/same-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/same-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..eec55f1a686
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/same-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/same-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/same-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..028ccc9d419
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/same-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/same-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/same-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..7c9efe9c540
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/same-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/same-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/script-tag/same-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/sharedworker-classic/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..0e8b46c9504
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/sharedworker-classic/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for sharedworker-classic to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "sharedworker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/sharedworker-classic/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/sharedworker-classic/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/sharedworker-classic/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/sharedworker-classic/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..13249150441
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/sharedworker-classic/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for sharedworker-classic to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "sharedworker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/sharedworker-classic/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/sharedworker-classic/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/sharedworker-classic/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/worker-classic/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..516598a9408
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/worker-classic/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for worker-classic to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/worker-classic/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/worker-classic/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/worker-classic/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/worker-classic/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..d2b60caa30d
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/worker-classic/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for worker-classic to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/worker-classic/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/worker-classic/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/worker-classic/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/worker-module/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..7c4685d0160
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/worker-module/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for worker-module to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-module",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/worker-module/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/worker-module/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/worker-module/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/worker-module/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..6d60f9473ab
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/worker-module/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for worker-module to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-module",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/worker-module/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/worker-module/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/worker-module/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..d1cf15a5745
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/cross-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/cross-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/cross-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..fe4f588ad94
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/cross-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/cross-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/cross-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..4106f858486
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/cross-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/cross-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/cross-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..09fb97ad952
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/cross-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/cross-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/cross-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..5f6c2bdb9e0
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/cross-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/cross-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/cross-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..cb8df81462a
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/cross-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/cross-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/cross-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..8aca08162ba
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..c6d243af554
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..2f672f8f536
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/same-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/same-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/same-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..dfa0026566a
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/same-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/same-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/same-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..9802aebc812
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/same-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/same-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/same-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..823d510fb73
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/same-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/same-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..ecff74b90dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/xhr/same-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..b0c2bb82783
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/cross-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/cross-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..be66cf93211
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/cross-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: same-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..4b04c2b5f22
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/cross-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/cross-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..be66cf93211
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/cross-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: same-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..53818e45328
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/cross-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/cross-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..be66cf93211
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/cross-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: same-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..50eedd46d53
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/cross-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/cross-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..be66cf93211
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/cross-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: same-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..594d1e23709
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/cross-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/cross-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..be66cf93211
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/cross-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: same-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..b52735fed34
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/cross-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/cross-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..be66cf93211
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/cross-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: same-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..88168ccbf8c
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..be66cf93211
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: same-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..5c6b99310ee
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..be66cf93211
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: same-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..dc653329cf1
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/same-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for fetch to same-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/same-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..be66cf93211
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/same-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: same-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..d7cf4f1fffd
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/same-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for fetch to same-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/same-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..be66cf93211
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/fetch/same-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: same-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..3efc9cd5a37
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..be66cf93211
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: same-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..16e6f6c59ff
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..be66cf93211
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: same-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..03bc1011caf
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..be66cf93211
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: same-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..29d622ea25e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..be66cf93211
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: same-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..e4322a6a1c7
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..be66cf93211
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: same-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..9ed0d18972a
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..be66cf93211
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/cross-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: same-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..5692389863e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..be66cf93211
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: same-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..45819d53de3
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..be66cf93211
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: same-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..38fc13c7504
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/same-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to same-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/same-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..be66cf93211
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/same-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: same-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..604a68f372c
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/same-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to same-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/same-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..be66cf93211
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/iframe-tag/same-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: same-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..8c9e5231584
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to cross-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..be66cf93211
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: same-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..47c03577e38
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to cross-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..be66cf93211
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: same-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..84548e25449
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to cross-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..be66cf93211
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: same-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..73b4b43fe3e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to cross-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..be66cf93211
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: same-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..dbba3b8e308
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to cross-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..be66cf93211
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: same-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..c91e2027091
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to cross-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..be66cf93211
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/cross-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: same-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..f2b58faa4d8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..be66cf93211
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: same-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..95dcbba40a1
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..be66cf93211
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: same-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..ccdaab708b3
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/same-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to same-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/same-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..be66cf93211
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/same-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: same-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..1224211f845
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/same-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to same-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/same-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..be66cf93211
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/img-tag/same-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: same-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..35fac64aafb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..be66cf93211
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: same-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..ccdc442b35a
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..be66cf93211
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: same-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..0e9b3556af2
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..be66cf93211
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: same-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..e5b72cf0743
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..be66cf93211
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: same-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..c00d12de0b1
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..be66cf93211
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: same-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..956910d4f81
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..be66cf93211
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/cross-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: same-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..64907c87168
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..be66cf93211
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: same-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..09b1c1f7449
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..be66cf93211
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: same-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..a5307e7bc4b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/same-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to same-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/same-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..be66cf93211
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/same-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: same-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..e15574fbc4b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/same-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to same-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/same-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..be66cf93211
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/script-tag/same-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: same-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..fa383bbb814
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "sharedworker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..be66cf93211
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: same-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..ecd1f5a1658
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "sharedworker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..be66cf93211
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: same-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..02710110601
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..be66cf93211
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: same-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..30deddfd1a3
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..be66cf93211
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: same-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/worker-module/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..5a734b9201d
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/worker-module/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-module",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/worker-module/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/worker-module/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..be66cf93211
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/worker-module/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: same-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/worker-module/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..fac2c79ad64
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/worker-module/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-module",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/worker-module/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/worker-module/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..be66cf93211
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/worker-module/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: same-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..d70c192e45a
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/cross-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/cross-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..be66cf93211
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/cross-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: same-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..1cf3b441ce9
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/cross-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/cross-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..be66cf93211
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/cross-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: same-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..f8b167293ff
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/cross-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/cross-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..be66cf93211
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/cross-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: same-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..34413f44d0b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/cross-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/cross-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..be66cf93211
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/cross-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: same-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..2dcc45119a1
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/cross-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/cross-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..be66cf93211
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/cross-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: same-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..843b7b8bd8e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/cross-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/cross-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..be66cf93211
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/cross-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: same-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..e8e560af2a0
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..be66cf93211
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: same-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..12198095da2
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..be66cf93211
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: same-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..300bcba4cf8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/same-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for xhr to same-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/same-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..be66cf93211
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/same-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: same-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..82729f56cca
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/same-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for xhr to same-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/same-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..be66cf93211
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/xhr/same-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: same-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..856bd37ac9b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..fd4826682ac
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..fd82f1b1104
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..223f1866e9d
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..6c803c76527
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..d2592196334
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..30a6824fb62
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..2034b691689
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..dd8050cb07c
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..ba8468ff86f
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..40905ede8f7
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..566975302f7
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..b68c3399124
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..7949aae354d
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..654c8d00c86
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..b9bfa6a5214
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..d403af05d75
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..87820e5812e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..f5dfb70043f
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..a9f0ac0a967
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..98ae2c0006f
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..8c4a715c277
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..8c477e58e5e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..37d55ef305f
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..cf39ccd38ad
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..f447202e3d5
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..e83c17e2b87
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..113be97571c
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..c52b4f5535b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..3834bf371f2
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..02cf5abed0c
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..ef022b72dfa
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..a79346508dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..eeb927bfa60
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..1c0e791357f
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..7b30449b1f9
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..a20e420662d
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..969f993927a
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..47f37f86f3a
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..77df78413f2
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..af9cf983258
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..020c41e1773
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..bd169400464
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..ed74429ca15
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..ebcc6bac5b9
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..cc8c6adb809
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..1c1bb7697f0
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..df62047bff0
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..17a8d06b6d8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "sharedworker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..85c37ed2762
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "sharedworker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..4d8aedb4004
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..52b029e38f3
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..f9629af5961
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-module",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..751470c0f11
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-module",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..5bfcfcf0c39
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..df7902ed007
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..aa3ae70aac1
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..7dcd6a27c5d
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..900b0694a59
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..733ccaa102d
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/cross-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..32d9172e807
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..1d2c73a4fee
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..5bd5fc1da3c
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..83ca559a9cf
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..5e988c33a2c
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..e3a7bf03723
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..4cff1d12f82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin-when-cross-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..057180a979d
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..3688dc22422
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..1ded06e4b46
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..06167dd942e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..a1dee152b5d
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..d774b21538c
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/cross-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..ea3dad3bf8f
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..ac35310f0ba
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..f61aada87f6
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..96a82aecc23
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..024dcdbb855
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..107bd7812f4
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/fetch/same-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..60b9f6766d1
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..af995ca2ead
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..60a98bedc8b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..b12f577a879
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..fa99e45193e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..d5834fb1a1d
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/cross-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..f10620601c4
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..256d8289726
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..582bca8a55d
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..0edd958eaa6
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..f4225e0e34d
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..e71abffe430
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/iframe-tag/same-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..fcfb36be078
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..c5f506163b0
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..e42ec7f173c
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..bc459e949d2
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..35179b3793e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..6657261925b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/cross-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..1256c4229cb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..7976130fb94
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..46fcbefebcb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..214285a9cc7
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..861d5510267
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..caff7fe9313
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/img-tag/same-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..c050bef9fac
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..7e9c5c20582
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..949d6267406
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..9544b914dda
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..12a3345a651
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..da5ec0b4fcc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/cross-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..8f52a22b3c2
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..c9c71a76d6b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..d6c7639e7d1
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..0252877d323
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..a1794947532
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..b88a6e8267f
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/script-tag/same-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/sharedworker-classic/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..0164b064deb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/sharedworker-classic/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for sharedworker-classic to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "sharedworker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/sharedworker-classic/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/sharedworker-classic/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/sharedworker-classic/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/sharedworker-classic/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..289fc670546
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/sharedworker-classic/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for sharedworker-classic to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "sharedworker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/sharedworker-classic/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/sharedworker-classic/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/sharedworker-classic/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/worker-classic/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..7561b4a0882
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/worker-classic/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for worker-classic to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/worker-classic/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/worker-classic/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/worker-classic/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/worker-classic/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..2244a4cab6f
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/worker-classic/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for worker-classic to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/worker-classic/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/worker-classic/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/worker-classic/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/worker-module/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..4fa1f76fc9c
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/worker-module/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for worker-module to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-module",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/worker-module/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/worker-module/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/worker-module/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/worker-module/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..f1f946f6df1
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/worker-module/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for worker-module to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-module",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/worker-module/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/worker-module/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/worker-module/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..62b1d9fcfff
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..70fb9f9b1a2
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..7fa069a3df4
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..443e5e99ebd
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..946ef6f0d6e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..24165be3275
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/cross-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..46f49d813cc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..5d6ae0ab3a6
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..c0f82076021
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/same-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/same-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/same-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..ac0c3e71bbf
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/same-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/same-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/same-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..83ad4b62912
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/same-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/same-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/same-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..92157004fac
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/same-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/same-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..1c32fba5a1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/xhr/same-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: strict-origin
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..46f755716fb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..ea92aa8bb90
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..81b93dbc335
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..8f83d836372
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..652544ef076
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..501473cb7d1
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..a4ab8302d9a
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..f4446f7c759
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..32f80b9210e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..ff6aafe80dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..5b4309f61bc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..dbf8920ceb0
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..e184f2f99d0
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..e713b614473
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..efcacb80db5
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..0e0ad876258
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..7aa58b40dd9
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..96940d924c5
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..826f0129e49
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..ff42df4b3c1
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..abd462ee755
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..141ccdb31ae
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..b322ae35886
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..1cafbbc10b4
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..d8beb3587ad
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..d70214a0bbc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..8f93cee2472
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..fe438d62a8b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..aa3d84b0d72
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..5b7a08d20b0
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..aedc3236108
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..ec1ff22f3be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..632a02bf290
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..16ae57857d5
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..10b36291cf7
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..4b3b746577e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..ae46fd10a28
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..cceae990937
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..9730c086bb4
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..edb2870fd2a
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..85bcee05924
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..cbe536dad6b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..f0020630ccb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..632083161f0
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..857b3cc3b11
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..27a0f129237
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..bb7bd17c076
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..3e38bae9f2b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..4783f45ac9d
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "sharedworker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..f2f186cdfda
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "sharedworker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..08a9996882f
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..4230c620d52
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..94f6837bc9d
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-module",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..3c533839f64
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-module",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..b97e5c69991
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..3de9921101b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..4a927af2bb0
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..c90180a3a07
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..6c5cd5d0323
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..433913e65b1
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..82d546f3030
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..76dfb9bcc00
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..cd9a26e1a25
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..8a345aab4f5
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..770b6be72ab
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..557c897f6dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html.headers
new file mode 100644
index 00000000000..c1d3fd1a0be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html.headers
@@ -0,0 +1,2 @@
+Access-Control-Allow-Origin: *
+Referrer-Policy: unsafe-url
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/fetch/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..ea2e8d11948
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/fetch/cross-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/fetch/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..2cfe2a0fb99
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/fetch/cross-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/fetch/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..44501a5f736
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/fetch/cross-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/fetch/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..9f51a700456
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/fetch/cross-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/fetch/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..b16692f66d4
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/fetch/cross-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/fetch/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..532809dd0af
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/fetch/cross-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/fetch/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..99882a623cc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/fetch/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/fetch/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..aae08809fa2
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/fetch/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/fetch/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..b8dbbd6e029
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/fetch/same-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/fetch/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..5480d46ff3f
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/fetch/same-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/fetch/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..0edaa41c1c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/fetch/same-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/fetch/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..2bcb3cbe6ec
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/fetch/same-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/iframe-tag/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..97ec687004a
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/iframe-tag/cross-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/iframe-tag/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..d631a6dcb12
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/iframe-tag/cross-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/iframe-tag/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..2d627c6d22e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/iframe-tag/cross-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/iframe-tag/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..366e8665a62
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/iframe-tag/cross-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/iframe-tag/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..3a55660c0e4
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/iframe-tag/cross-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/iframe-tag/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..9b857831f09
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/iframe-tag/cross-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/iframe-tag/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..d80ff5a5807
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/iframe-tag/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/iframe-tag/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..012d095ef49
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/iframe-tag/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/iframe-tag/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..f2f4595415a
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/iframe-tag/same-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/iframe-tag/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..667567ebba1
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/iframe-tag/same-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/iframe-tag/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..2824cead304
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/iframe-tag/same-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/iframe-tag/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..9efcc95c2aa
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/iframe-tag/same-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/img-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/img-tag/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..3d9206f18f1
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/img-tag/cross-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/img-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/img-tag/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..6d5c1e56cb2
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/img-tag/cross-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/img-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/img-tag/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..51596668d93
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/img-tag/cross-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/img-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/img-tag/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..9cd2d1ffee5
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/img-tag/cross-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/img-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/img-tag/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..4d71131d9b9
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/img-tag/cross-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/img-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/img-tag/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..29a55b76272
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/img-tag/cross-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/img-tag/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..09f9e964f66
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/img-tag/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/img-tag/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..ee69797376a
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/img-tag/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/img-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/img-tag/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..8b9f2909c64
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/img-tag/same-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/img-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/img-tag/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..63ae656a1bc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/img-tag/same-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/img-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/img-tag/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..63a3adfeee1
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/img-tag/same-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/img-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/img-tag/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..bf559ef2fa1
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/img-tag/same-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "img-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/script-tag/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..e49bb460dba
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/script-tag/cross-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/script-tag/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..cc431565cb1
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/script-tag/cross-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/script-tag/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..acba24bf648
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/script-tag/cross-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/script-tag/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..6d335a915c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/script-tag/cross-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/script-tag/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..a72d9f9d555
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/script-tag/cross-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/script-tag/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..5ae41b8a475
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/script-tag/cross-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/script-tag/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..41d2ffbf3bb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/script-tag/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/script-tag/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..c5034618698
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/script-tag/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/script-tag/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..ccf74bfc978
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/script-tag/same-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/script-tag/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..1f3c30737f9
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/script-tag/same-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/script-tag/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..8b7f117bd90
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/script-tag/same-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/script-tag/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..de7ff149fad
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/script-tag/same-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/sharedworker-classic/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..bf5fbd15347
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/sharedworker-classic/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "sharedworker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/sharedworker-classic/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..019f99b8515
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/sharedworker-classic/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "sharedworker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/worker-classic/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..bb03d60a754
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/worker-classic/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/worker-classic/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..2647d9c0068
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/worker-classic/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/worker-module/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..48e9b2fc797
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/worker-module/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-module",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/worker-module/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..c471a2ab65f
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/worker-module/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-module",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/xhr/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..d05cf044d6b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/xhr/cross-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/xhr/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..a46b1806e1d
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/xhr/cross-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/xhr/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..bb3472038d3
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/xhr/cross-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/xhr/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..d7ff137270e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/xhr/cross-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/xhr/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..d2fe3e21cd9
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/xhr/cross-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/xhr/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..5646eec5988
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/xhr/cross-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/xhr/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..67e588307b5
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/xhr/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/xhr/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..e165cb1f414
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/xhr/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/xhr/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..395832acebd
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/xhr/same-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/xhr/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..99224b7cb6b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/xhr/same-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/xhr/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..a2c89524c97
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/xhr/same-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/xhr/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..d868323f574
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/xhr/same-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..d5c1ef92532
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer-when-downgrade">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..e1b9a4e96e3
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="no-referrer-when-downgrade">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..ff187967c8a
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer-when-downgrade">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..aebd3352749
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer-when-downgrade">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..ebc64f516ad
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="no-referrer-when-downgrade">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..6d2aee1733f
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer-when-downgrade">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..2e465f61035
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer-when-downgrade">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..eb63faeca13
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="no-referrer-when-downgrade">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..74d717b82d0
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer-when-downgrade">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..d889f2addda
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer-when-downgrade">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..3a1981b72b4
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="no-referrer-when-downgrade">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..e8c9f719f6c
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer-when-downgrade">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..0e6de725c15
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer-when-downgrade">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..f00394f8864
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="no-referrer-when-downgrade">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..29bbb89fcd4
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer-when-downgrade">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..edb2f7d6cf4
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer-when-downgrade">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..245f0e9c422
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="no-referrer-when-downgrade">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..ddd427653f9
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer-when-downgrade">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..118bb843efb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer-when-downgrade">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..e55d45239c2
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="no-referrer-when-downgrade">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..34652fae30b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer-when-downgrade">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..798a95496ef
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer-when-downgrade">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..399775f8fd6
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="no-referrer-when-downgrade">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..99b647b458a
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer-when-downgrade">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..b09756f12a1
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer-when-downgrade">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..d2a2b71e826
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="no-referrer-when-downgrade">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..f7c457e5f29
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer-when-downgrade">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..24eb8842d05
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer-when-downgrade">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..17bb9c2610e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="no-referrer-when-downgrade">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..29bbc505f9d
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer-when-downgrade">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..7963b7905c6
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer-when-downgrade">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..843e6926217
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="no-referrer-when-downgrade">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..464aba106c1
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer-when-downgrade">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..7dc965416c5
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer-when-downgrade">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..f941e1e48f9
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="no-referrer-when-downgrade">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..1e369f1d45d
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer-when-downgrade">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..780113a6ee4
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer-when-downgrade">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "sharedworker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..75648ff4ecf
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="no-referrer-when-downgrade">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "sharedworker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..816854345fd
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer-when-downgrade">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..0ab03889e98
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="no-referrer-when-downgrade">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..c7095216619
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer-when-downgrade">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-module",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..37ac290d6b3
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="no-referrer-when-downgrade">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-module",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..70ea4320555
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer-when-downgrade">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..0a25233e4f1
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="no-referrer-when-downgrade">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..0460050d4ba
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer-when-downgrade">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..0e7cdab08f8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer-when-downgrade">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..7fb8cf98201
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="no-referrer-when-downgrade">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..e49c19a7486
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer-when-downgrade">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..d7be1b63225
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer-when-downgrade">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..79dc86420b0
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="no-referrer-when-downgrade">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..013fc3a5a3f
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer-when-downgrade">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..20c9d84a140
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer-when-downgrade">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..9d9b89a2560
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="no-referrer-when-downgrade">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..71d97ee0390
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer-when-downgrade">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/fetch/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..29533784c3f
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/fetch/cross-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/fetch/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..fa3d946a8ae
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/fetch/cross-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="no-referrer">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/fetch/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..aea45c919e4
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/fetch/cross-http.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-http origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/fetch/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..787b33c1ea0
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/fetch/cross-https.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-https origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/fetch/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..8295a63e05a
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/fetch/cross-https.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-https origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="no-referrer">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/fetch/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..3481eda3ed7
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/fetch/cross-https.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-https origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/fetch/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..153563a38b3
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/fetch/same-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for fetch to same-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/fetch/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..c1910747623
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/fetch/same-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for fetch to same-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="no-referrer">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/fetch/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..1d87d656f67
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/fetch/same-http.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for fetch to same-http origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/fetch/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..38fe934f9a9
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/fetch/same-https.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for fetch to same-https origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/fetch/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..a43637790ac
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/fetch/same-https.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for fetch to same-https origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="no-referrer">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/fetch/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..98fe5237308
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/fetch/same-https.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for fetch to same-https origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/iframe-tag/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..bb306873bd8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/iframe-tag/cross-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/iframe-tag/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..f8e7262bd81
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/iframe-tag/cross-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="no-referrer">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/iframe-tag/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..b0d75cf0323
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/iframe-tag/cross-http.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-http origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/iframe-tag/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..6892ef7c4d4
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/iframe-tag/cross-https.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-https origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/iframe-tag/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..589122d0e9f
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/iframe-tag/cross-https.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-https origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="no-referrer">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/iframe-tag/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..f4b1440f04b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/iframe-tag/cross-https.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-https origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/iframe-tag/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..3d85b52254e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/iframe-tag/same-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to same-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/iframe-tag/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..89d6d634187
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/iframe-tag/same-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to same-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="no-referrer">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/iframe-tag/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..ba283d5a737
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/iframe-tag/same-http.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to same-http origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/iframe-tag/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..35b805dcf30
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/iframe-tag/same-https.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to same-https origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/iframe-tag/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..fb1f7ad461b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/iframe-tag/same-https.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to same-https origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="no-referrer">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/iframe-tag/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..60516dfec79
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/iframe-tag/same-https.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to same-https origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/script-tag/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..9574d97ad89
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/script-tag/cross-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/script-tag/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..b71bb9fe8ad
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/script-tag/cross-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="no-referrer">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/script-tag/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..12cc3dd81a7
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/script-tag/cross-http.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-http origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/script-tag/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..8bfbb561e96
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/script-tag/cross-https.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-https origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/script-tag/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..9bec2a9a425
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/script-tag/cross-https.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-https origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="no-referrer">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/script-tag/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..f0e8af619c0
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/script-tag/cross-https.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-https origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/script-tag/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..42f74dc4a20
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/script-tag/same-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to same-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/script-tag/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..87492a8c651
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/script-tag/same-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to same-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="no-referrer">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/script-tag/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..f4f634401b1
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/script-tag/same-http.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to same-http origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/script-tag/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..7aae843c139
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/script-tag/same-https.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to same-https origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/script-tag/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..127e701ac50
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/script-tag/same-https.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to same-https origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="no-referrer">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/script-tag/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..916cbe7f4a7
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/script-tag/same-https.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to same-https origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/sharedworker-classic/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..238d76c056d
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/sharedworker-classic/same-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for sharedworker-classic to same-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "sharedworker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/sharedworker-classic/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..a0902935a13
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/sharedworker-classic/same-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for sharedworker-classic to same-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="no-referrer">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "sharedworker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/worker-classic/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..047a7a8f891
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/worker-classic/same-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for worker-classic to same-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/worker-classic/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..075b7c7043f
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/worker-classic/same-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for worker-classic to same-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="no-referrer">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/worker-module/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..9150b8631d7
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/worker-module/same-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for worker-module to same-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-module",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/worker-module/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..e0d49ad7059
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/worker-module/same-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for worker-module to same-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="no-referrer">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-module",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/xhr/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..0ef6e1031f8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/xhr/cross-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/xhr/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..c7ecbb83014
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/xhr/cross-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="no-referrer">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/xhr/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..12cb9b5ba93
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/xhr/cross-http.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-http origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/xhr/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..28d9711ca7c
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/xhr/cross-https.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-https origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/xhr/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..e72cc70a4f2
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/xhr/cross-https.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-https origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="no-referrer">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/xhr/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..896939dfae5
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/xhr/cross-https.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-https origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/xhr/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..22886a1de58
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/xhr/same-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for xhr to same-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/xhr/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..9c5bbb3e914
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/xhr/same-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for xhr to same-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="no-referrer">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/xhr/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..c526d733ebf
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/xhr/same-http.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for xhr to same-http origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/xhr/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..1d3a007c1ef
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/xhr/same-https.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for xhr to same-https origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/xhr/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..793c851998d
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/xhr/same-https.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for xhr to same-https origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="no-referrer">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/xhr/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..98b4af4aa36
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/xhr/same-https.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that sub-resource never gets the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
+ <meta name="assert" content="Referrer Policy: Expects omitted for xhr to same-https origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="no-referrer">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..74384c6c1f4
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..84dfbd78e6c
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..1cb2eb25b98
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..28b8c144474
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..92caf095e05
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..05e1d8ed70c
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..5a2c3706c77
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/same-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..98119ade78e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/same-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..153fbe73c33
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/same-http.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-http origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..eebe2d506ac
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/same-https.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..556d503c973
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/same-https.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..1f1d780c615
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/fetch/same-https.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..c40ee82385e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..bf99ea1b980
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..47ce26153a6
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..450142261f3
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..e96342b7d30
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..3aed5628194
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..a280c51a648
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..9c6ccb79207
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..829e02d2b63
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-http origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..ae420db20ac
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..6aed72d2702
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..f29d9a5f033
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..e2b5a99d82b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..386be93bf63
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..3a5518eadd0
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..88126506ddd
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..dacd343e0cc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..6ca297fdafa
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..ac0e701aaa3
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..36a6ca56fe5
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..3196566b196
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/same-http.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-http origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..8c41b0aa0a8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/same-https.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..1fdda9f6e1e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/same-https.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..228b216bf60
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/script-tag/same-https.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..d8b81424121
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "sharedworker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..13907b6ee3f
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "sharedworker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..2d47f33f961
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..1a94c31e6e6
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..0014f469562
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-module",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..8153dc4feac
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-module",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..3c5fde6f183
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/cross-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..3615808744e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/cross-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..3103661f217
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/cross-http.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..6adf33ef956
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/cross-https.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..187fcb55c86
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/cross-https.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..d0a06592032
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/cross-https.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..fd98090afeb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/same-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..5ca1a8f90de
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/same-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..ef2c88d8a3d
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/same-http.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-http origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..ccb48c90102
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/same-https.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..95c24803a4c
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/same-https.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..3a3eeacb397
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/xhr/same-https.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/fetch/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..867e453f9c9
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/fetch/cross-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/fetch/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..b2ddcd35351
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/fetch/cross-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/fetch/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..955985163c2
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/fetch/cross-http.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/fetch/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..8cc66b40477
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/fetch/cross-https.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/fetch/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..6f7f790742b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/fetch/cross-https.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/fetch/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..a8475099903
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/fetch/cross-https.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/fetch/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..fdfcaa51c37
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/fetch/same-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/fetch/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..7daa30e19be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/fetch/same-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/fetch/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..bbc11c950d1
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/fetch/same-http.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-http origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/fetch/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..f07cda1a0ae
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/fetch/same-https.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/fetch/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..17ced6cb633
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/fetch/same-https.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/fetch/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..297a37bcccd
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/fetch/same-https.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/iframe-tag/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..aec51043d25
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/iframe-tag/cross-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/iframe-tag/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..ea5a1e65912
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/iframe-tag/cross-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/iframe-tag/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..5dd09037aed
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/iframe-tag/cross-http.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/iframe-tag/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..d2eace1a501
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/iframe-tag/cross-https.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/iframe-tag/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..7a2872df2d6
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/iframe-tag/cross-https.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/iframe-tag/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..6c3af754b61
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/iframe-tag/cross-https.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/iframe-tag/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..1fde956c52e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/iframe-tag/same-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/iframe-tag/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..9090a56f19c
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/iframe-tag/same-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/iframe-tag/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..69827f5e71d
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/iframe-tag/same-http.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-http origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/iframe-tag/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..321ff5d2dfb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/iframe-tag/same-https.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/iframe-tag/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..46d567048a5
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/iframe-tag/same-https.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/iframe-tag/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..64567589fa4
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/iframe-tag/same-https.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/script-tag/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..2494c0a49e8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/script-tag/cross-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/script-tag/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..5be226f439c
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/script-tag/cross-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/script-tag/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..3496ddd889f
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/script-tag/cross-http.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/script-tag/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..ec31a89afa5
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/script-tag/cross-https.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/script-tag/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..fcf281ec367
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/script-tag/cross-https.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/script-tag/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..93076790b29
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/script-tag/cross-https.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/script-tag/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..7f420bd58c1
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/script-tag/same-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/script-tag/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..75182127e9b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/script-tag/same-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/script-tag/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..26f358b9db9
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/script-tag/same-http.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-http origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/script-tag/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..f6a725d3963
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/script-tag/same-https.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/script-tag/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..b09d3f025e9
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/script-tag/same-https.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/script-tag/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..9e57f2f6421
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/script-tag/same-https.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/sharedworker-classic/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..32c9c6a506f
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/sharedworker-classic/same-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for sharedworker-classic to same-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "sharedworker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/sharedworker-classic/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..f24202d4c1b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/sharedworker-classic/same-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for sharedworker-classic to same-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "sharedworker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/worker-classic/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..525c4babfbf
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/worker-classic/same-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for worker-classic to same-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/worker-classic/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..c1c8aa627c0
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/worker-classic/same-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for worker-classic to same-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/worker-module/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..8482d7d2aaf
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/worker-module/same-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for worker-module to same-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-module",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/worker-module/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..01fd9140510
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/worker-module/same-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for worker-module to same-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-module",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/xhr/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..10ae3a06788
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/xhr/cross-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/xhr/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..21015150882
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/xhr/cross-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/xhr/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..8450e8b7044
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/xhr/cross-http.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/xhr/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..f2093096565
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/xhr/cross-https.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/xhr/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..bd7f2f73327
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/xhr/cross-https.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/xhr/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..ee4f2c5c6b1
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/xhr/cross-https.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/xhr/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..011a0a9d20f
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/xhr/same-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/xhr/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..aed06c5c1b8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/xhr/same-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/xhr/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..c6d9c461b9b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/xhr/same-http.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-http origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/xhr/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..cb5e94086b0
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/xhr/same-https.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/xhr/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..1702c3f10f8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/xhr/same-https.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/xhr/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..674b324bded
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/xhr/same-https.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/fetch/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..4623293b2b9
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/fetch/cross-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="same-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/fetch/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..3d2b7856f67
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/fetch/cross-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="same-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/fetch/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..6f86e2c9fe6
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/fetch/cross-http.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-http origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="same-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/fetch/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..9734af21a03
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/fetch/cross-https.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-https origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="same-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/fetch/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..dd32b51d9cd
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/fetch/cross-https.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-https origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="same-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/fetch/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..375ac257f6a
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/fetch/cross-https.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-https origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="same-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/fetch/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..6742ffba568
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/fetch/same-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="same-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/fetch/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..67ecbd6eefb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/fetch/same-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="same-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/fetch/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..6163be73c9e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/fetch/same-http.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for fetch to same-http origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="same-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/fetch/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..0bc2c07d831
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/fetch/same-https.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for fetch to same-https origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="same-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/iframe-tag/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..cf05e166a23
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/iframe-tag/cross-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="same-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/iframe-tag/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..15ac1c56f43
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/iframe-tag/cross-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="same-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/iframe-tag/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..54a2884ecd3
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/iframe-tag/cross-http.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-http origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="same-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/iframe-tag/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..3e7e1bc166b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/iframe-tag/cross-https.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-https origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="same-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/iframe-tag/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..942691f66ae
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/iframe-tag/cross-https.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-https origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="same-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/iframe-tag/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..cf51aa15b1b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/iframe-tag/cross-https.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-https origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="same-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/iframe-tag/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..d87e8674b1d
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/iframe-tag/same-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="same-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/iframe-tag/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..8bc96f3cb55
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/iframe-tag/same-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="same-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/iframe-tag/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..16e76d16d20
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/iframe-tag/same-http.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to same-http origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="same-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/iframe-tag/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..84063c89db2
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/iframe-tag/same-https.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to same-https origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="same-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/script-tag/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..b7e3924092b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/script-tag/cross-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="same-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/script-tag/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..5ff171a3863
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/script-tag/cross-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="same-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/script-tag/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..0361ecee042
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/script-tag/cross-http.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-http origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="same-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/script-tag/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..c2223be2345
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/script-tag/cross-https.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-https origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="same-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/script-tag/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..9655ad2b238
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/script-tag/cross-https.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-https origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="same-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/script-tag/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..dab25e384d7
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/script-tag/cross-https.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-https origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="same-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/script-tag/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..694a8a845b2
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/script-tag/same-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="same-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/script-tag/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..6dfac02ae12
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/script-tag/same-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="same-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/script-tag/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..65d0d037142
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/script-tag/same-http.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to same-http origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="same-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/script-tag/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..3c6e7b143e9
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/script-tag/same-https.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to same-https origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="same-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/sharedworker-classic/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..d5396abbc58
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/sharedworker-classic/same-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="same-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "sharedworker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/sharedworker-classic/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..d6e198ad0a9
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/sharedworker-classic/same-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="same-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "sharedworker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/worker-classic/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..bb60709ee88
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/worker-classic/same-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="same-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/worker-classic/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..1054ef30ef0
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/worker-classic/same-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="same-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/worker-module/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..3896c5c5d21
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/worker-module/same-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="same-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-module",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/worker-module/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..ce7fa2f2298
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/worker-module/same-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="same-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-module",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/xhr/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..49168ce2fba
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/xhr/cross-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="same-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/xhr/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..0f6ad03b52f
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/xhr/cross-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="same-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/xhr/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..b081fd75cab
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/xhr/cross-http.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-http origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="same-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/xhr/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..d6ce96eac62
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/xhr/cross-https.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-https origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="same-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/xhr/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..8c35488b0b4
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/xhr/cross-https.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-https origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="same-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/xhr/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..1ef6481ad45
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/xhr/cross-https.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-https origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="same-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/xhr/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..2a1f7434eb3
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/xhr/same-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="same-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/xhr/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..4d21f0d155a
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/xhr/same-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="same-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/xhr/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..2db9e9aae41
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/xhr/same-http.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for xhr to same-http origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="same-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/xhr/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..c38435bd25c
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/xhr/same-https.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
+ <meta name="assert" content="Referrer Policy: Expects omitted for xhr to same-https origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="same-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "omitted",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..9b79a324fcf
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..5e6b89694dd
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="strict-origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..a2159631980
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..e47bee01a5e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..87e7a2fa113
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="strict-origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..cc43a46b975
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..8d5fcabef90
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..ac1c025ef8f
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="strict-origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..489f5774d9d
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-http origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..765f0bb9420
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..8752c9a7426
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="strict-origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..07aebd3a634
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..b4667774510
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..bffd18d59d5
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="strict-origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..0ba113edbdc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..e7359287614
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..e8d8b617ad0
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="strict-origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..d961eafb7fc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..fad227d9b3b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..04941be8e60
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="strict-origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..d060ed1e12d
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-http origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..9fb1fe3b6ca
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..83146badd7f
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="strict-origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..542d4e266eb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..c076fc85e27
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..88ad2099aa1
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="strict-origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..f72a238f1b0
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..7086dc263bc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..374e670f2ea
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="strict-origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..e6a4a1cae83
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..370b27bd52c
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..378e4373ddc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="strict-origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..e1fd5deaedf
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-http origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..06b54e84a10
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-https.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..dfda8a029c2
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-https.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="strict-origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..09065d9a990
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-https.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..795b1a698b0
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "sharedworker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..704f1cfab82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="strict-origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "sharedworker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..8dc9c49ef91
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..0d782a2f3e5
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="strict-origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..00c95830a33
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-module",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..4634152ff50
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="strict-origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-module",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..ef5004a9269
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/cross-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..e66aad43404
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/cross-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="strict-origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..39a59503848
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/cross-http.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..75dc714ae3b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/cross-https.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..ca88f4bd3a3
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/cross-https.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="strict-origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..11eef668cf9
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/cross-https.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..657c7d09ca4
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..d8d3a81e2ba
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="strict-origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..98c953b11fd
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-http origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..26c1f00dde2
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/same-https.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..798f6fc480a
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/same-https.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="strict-origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..2f861ecf84f
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/xhr/same-https.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin-when-cross-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/fetch/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..86a8cf5916a
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/fetch/cross-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/fetch/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..7165df9b9a2
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/fetch/cross-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="strict-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/fetch/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..eac9d1e3e32
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/fetch/cross-http.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/fetch/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..5baa5232bbc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/fetch/cross-https.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/fetch/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..386451d9d50
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/fetch/cross-https.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="strict-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/fetch/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..0ff2d30e0a3
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/fetch/cross-https.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/fetch/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..698db2d282f
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/fetch/same-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/fetch/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..8db97af5364
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/fetch/same-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="strict-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/fetch/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..e86ce77b4a8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/fetch/same-http.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-http origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/fetch/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..2e486d4b7dc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/fetch/same-https.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/fetch/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..940d3b30e42
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/fetch/same-https.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="strict-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/fetch/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..c33feb0e35f
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/fetch/same-https.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/iframe-tag/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..3107b816c5b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/iframe-tag/cross-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/iframe-tag/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..0bdc0868631
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/iframe-tag/cross-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="strict-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/iframe-tag/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..6b63d1831ff
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/iframe-tag/cross-http.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/iframe-tag/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..0ffbbb95fc5
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/iframe-tag/cross-https.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/iframe-tag/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..0ccfc472390
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/iframe-tag/cross-https.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="strict-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/iframe-tag/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..d6c376a4e65
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/iframe-tag/cross-https.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/iframe-tag/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..2d40b45cc00
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/iframe-tag/same-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/iframe-tag/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..f7f02844de2
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/iframe-tag/same-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="strict-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/iframe-tag/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..3bd77a1c633
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/iframe-tag/same-http.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-http origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/iframe-tag/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..ae494dbee49
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/iframe-tag/same-https.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/iframe-tag/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..8d9b5f4d3d9
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/iframe-tag/same-https.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="strict-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/iframe-tag/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..0abed458763
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/iframe-tag/same-https.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/script-tag/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..eaf16c30210
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/script-tag/cross-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/script-tag/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..1488f50aff8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/script-tag/cross-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="strict-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/script-tag/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..b61faea974a
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/script-tag/cross-http.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/script-tag/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..4bf90c57269
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/script-tag/cross-https.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/script-tag/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..eba80e2a1ef
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/script-tag/cross-https.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="strict-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/script-tag/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..b38f5ba075e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/script-tag/cross-https.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/script-tag/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..63bcd9f654c
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/script-tag/same-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/script-tag/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..432125bc005
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/script-tag/same-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="strict-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/script-tag/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..c47194b15ef
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/script-tag/same-http.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-http origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/script-tag/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..bf42bba75f2
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/script-tag/same-https.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/script-tag/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..a7195a0f8f2
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/script-tag/same-https.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="strict-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/script-tag/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..b4119eb7c42
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/script-tag/same-https.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/sharedworker-classic/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..6b00a6bd35a
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/sharedworker-classic/same-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for sharedworker-classic to same-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "sharedworker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/sharedworker-classic/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..3d57f36d479
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/sharedworker-classic/same-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for sharedworker-classic to same-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="strict-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "sharedworker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/worker-classic/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..8360ff528ad
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/worker-classic/same-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for worker-classic to same-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/worker-classic/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..35243d8c0df
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/worker-classic/same-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for worker-classic to same-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="strict-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/worker-module/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..5292a9f479b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/worker-module/same-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for worker-module to same-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-module",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/worker-module/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..9f6cb30717f
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/worker-module/same-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for worker-module to same-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="strict-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-module",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/xhr/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..20be1ee2d82
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/xhr/cross-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/xhr/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..fd280355417
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/xhr/cross-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="strict-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/xhr/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..878d1b0c28d
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/xhr/cross-http.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/xhr/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..5511aa6d54f
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/xhr/cross-https.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/xhr/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..ff0984afa87
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/xhr/cross-https.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="strict-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/xhr/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..6381e3025fd
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/xhr/cross-https.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/xhr/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..236eab003ff
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/xhr/same-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/xhr/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..c47edfd1881
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/xhr/same-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="strict-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/xhr/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..5f4e9a08c83
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/xhr/same-http.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-http origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/xhr/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..28192674c92
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/xhr/same-https.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/xhr/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..02c868a4672
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/xhr/same-https.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="strict-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/xhr/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..20f964044e2
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/xhr/same-https.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
+ <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="strict-origin">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "origin",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/fetch/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..383a91559b3
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/fetch/cross-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="unsafe-url">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/fetch/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..3a7df294f9a
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/fetch/cross-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="unsafe-url">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/fetch/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..557684095b1
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/fetch/cross-http.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="unsafe-url">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/fetch/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..85a20c12d97
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/fetch/cross-https.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="unsafe-url">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/fetch/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..0c058c0832f
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/fetch/cross-https.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="unsafe-url">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/fetch/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..91884c7afe6
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/fetch/cross-https.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="unsafe-url">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/fetch/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..ad39013c5f3
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/fetch/same-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="unsafe-url">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/fetch/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..2bc73e76e68
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/fetch/same-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="unsafe-url">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/fetch/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..7a69b529789
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/fetch/same-http.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="unsafe-url">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/fetch/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..4cda477b772
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/fetch/same-https.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="unsafe-url">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/fetch/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..ed261048b38
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/fetch/same-https.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="unsafe-url">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/fetch/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..cb5bcf637be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/fetch/same-https.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="unsafe-url">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..5e9376358b9
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/cross-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="unsafe-url">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..50532da8910
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/cross-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="unsafe-url">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..4a6fbf0d03a
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/cross-http.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="unsafe-url">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..f20be36ad1c
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/cross-https.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="unsafe-url">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..1925370c86b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/cross-https.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="unsafe-url">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..4474708caac
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/cross-https.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="unsafe-url">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..ac6bcec6450
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/same-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="unsafe-url">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..a6364188266
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/same-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="unsafe-url">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..4b7889385be
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/same-http.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="unsafe-url">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..0bbc78707db
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/same-https.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="unsafe-url">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..63d3c37d89a
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/same-https.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="unsafe-url">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..af08f36ef37
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/iframe-tag/same-https.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="unsafe-url">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/script-tag/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..95b58fa5d65
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/script-tag/cross-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="unsafe-url">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/script-tag/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..f70dab3d46a
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/script-tag/cross-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="unsafe-url">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/script-tag/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..e5dbfb16d0d
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/script-tag/cross-http.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="unsafe-url">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/script-tag/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..b740b81c258
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/script-tag/cross-https.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="unsafe-url">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/script-tag/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..dcc34b6ef19
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/script-tag/cross-https.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="unsafe-url">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/script-tag/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..bc7ee4cce9b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/script-tag/cross-https.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="unsafe-url">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/script-tag/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..052c6cf287b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/script-tag/same-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="unsafe-url">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/script-tag/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..acd64f240b9
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/script-tag/same-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="unsafe-url">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/script-tag/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..5553fe06a0a
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/script-tag/same-http.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="unsafe-url">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/script-tag/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..ed63b00877c
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/script-tag/same-https.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="unsafe-url">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/script-tag/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..9dd6c3b3b52
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/script-tag/same-https.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="unsafe-url">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/script-tag/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..d46b65c5d6e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/script-tag/same-https.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="unsafe-url">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..04c02ae47ef
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="unsafe-url">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "sharedworker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..83b4baf0bb3
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="unsafe-url">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "sharedworker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/worker-classic/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..bcaf210bc4a
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/worker-classic/same-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="unsafe-url">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/worker-classic/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..7f3fd250721
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/worker-classic/same-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="unsafe-url">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/worker-module/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..01bc2a61fae
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/worker-module/same-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="unsafe-url">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-module",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/worker-module/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..5af7f8fc21a
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/worker-module/same-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="unsafe-url">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-module",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/xhr/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..77aaa879312
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/xhr/cross-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="unsafe-url">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/xhr/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..6e1b0196217
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/xhr/cross-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="unsafe-url">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/xhr/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..bb955ba7656
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/xhr/cross-http.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="unsafe-url">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/xhr/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..21f65dedfd3
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/xhr/cross-https.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="unsafe-url">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/xhr/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..b19fa390d20
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/xhr/cross-https.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="unsafe-url">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/xhr/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..43fa7e0286e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/xhr/cross-https.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="unsafe-url">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/xhr/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..69d157e43a9
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/xhr/same-http.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="unsafe-url">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/xhr/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..f481905747b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/xhr/same-http.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="unsafe-url">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/xhr/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..b359aeeb63f
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/xhr/same-http.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="unsafe-url">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/xhr/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..eb14cf0a195
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/xhr/same-https.keep-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and keep-origin redirection from http context.">
+ <meta name="referrer" content="unsafe-url">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/xhr/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..d46b4cd5c2a
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/xhr/same-https.no-redirect.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and no-redirect redirection from http context.">
+ <meta name="referrer" content="unsafe-url">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/xhr/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..189c6bc5144
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/xhr/same-https.swap-origin.http.html
@@ -0,0 +1,35 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and swap-origin redirection from http context.">
+ <meta name="referrer" content="unsafe-url">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/fetch/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..ea2e8d11948
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/fetch/cross-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/fetch/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..2cfe2a0fb99
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/fetch/cross-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/fetch/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..44501a5f736
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/fetch/cross-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/fetch/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..9f51a700456
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/fetch/cross-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/fetch/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..b16692f66d4
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/fetch/cross-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/fetch/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..532809dd0af
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/fetch/cross-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/fetch/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..99882a623cc
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/fetch/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/fetch/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..aae08809fa2
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/fetch/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/fetch/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..b8dbbd6e029
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/fetch/same-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/fetch/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..5480d46ff3f
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/fetch/same-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/fetch/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..0edaa41c1c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/fetch/same-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/fetch/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..2bcb3cbe6ec
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/fetch/same-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "fetch",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/iframe-tag/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..97ec687004a
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/iframe-tag/cross-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/iframe-tag/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..d631a6dcb12
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/iframe-tag/cross-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/iframe-tag/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..2d627c6d22e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/iframe-tag/cross-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/iframe-tag/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..366e8665a62
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/iframe-tag/cross-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/iframe-tag/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..3a55660c0e4
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/iframe-tag/cross-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/iframe-tag/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..9b857831f09
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/iframe-tag/cross-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/iframe-tag/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..d80ff5a5807
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/iframe-tag/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/iframe-tag/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..012d095ef49
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/iframe-tag/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/iframe-tag/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..f2f4595415a
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/iframe-tag/same-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/iframe-tag/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..667567ebba1
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/iframe-tag/same-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/iframe-tag/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..2824cead304
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/iframe-tag/same-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/iframe-tag/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..9efcc95c2aa
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/iframe-tag/same-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "iframe-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/script-tag/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..e49bb460dba
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/script-tag/cross-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/script-tag/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..cc431565cb1
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/script-tag/cross-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/script-tag/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..acba24bf648
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/script-tag/cross-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/script-tag/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..6d335a915c8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/script-tag/cross-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/script-tag/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..a72d9f9d555
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/script-tag/cross-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/script-tag/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..5ae41b8a475
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/script-tag/cross-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/script-tag/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..41d2ffbf3bb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/script-tag/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/script-tag/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..c5034618698
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/script-tag/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/script-tag/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..ccf74bfc978
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/script-tag/same-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/script-tag/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..1f3c30737f9
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/script-tag/same-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/script-tag/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..8b7f117bd90
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/script-tag/same-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/script-tag/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..de7ff149fad
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/script-tag/same-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "script-tag",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/sharedworker-classic/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..bf5fbd15347
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/sharedworker-classic/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "sharedworker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/sharedworker-classic/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..019f99b8515
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/sharedworker-classic/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "sharedworker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/worker-classic/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..bb03d60a754
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/worker-classic/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/worker-classic/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..2647d9c0068
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/worker-classic/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-classic",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/worker-module/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..48e9b2fc797
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/worker-module/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-module",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/worker-module/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..c471a2ab65f
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/worker-module/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "worker-module",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/xhr/cross-http.keep-origin.http.html
new file mode 100644
index 00000000000..d05cf044d6b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/xhr/cross-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/xhr/cross-http.no-redirect.http.html
new file mode 100644
index 00000000000..a46b1806e1d
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/xhr/cross-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/xhr/cross-http.swap-origin.http.html
new file mode 100644
index 00000000000..bb3472038d3
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/xhr/cross-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/xhr/cross-https.keep-origin.http.html
new file mode 100644
index 00000000000..d7ff137270e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/xhr/cross-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/xhr/cross-https.no-redirect.http.html
new file mode 100644
index 00000000000..d2fe3e21cd9
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/xhr/cross-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/xhr/cross-https.swap-origin.http.html
new file mode 100644
index 00000000000..5646eec5988
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/xhr/cross-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "cross-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/xhr/same-http.keep-origin.http.html
new file mode 100644
index 00000000000..67e588307b5
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/xhr/same-http.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/xhr/same-http.no-redirect.http.html
new file mode 100644
index 00000000000..e165cb1f414
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/xhr/same-http.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/xhr/same-http.swap-origin.http.html
new file mode 100644
index 00000000000..395832acebd
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/xhr/same-http.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-http",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/xhr/same-https.keep-origin.http.html
new file mode 100644
index 00000000000..99224b7cb6b
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/xhr/same-https.keep-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and keep-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "keep-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/xhr/same-https.no-redirect.http.html
new file mode 100644
index 00000000000..a2c89524c97
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/xhr/same-https.no-redirect.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and no-redirect redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "no-redirect",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/xhr/same-https.swap-origin.http.html
new file mode 100644
index 00000000000..d868323f574
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/xhr/same-https.swap-origin.http.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
+<html>
+ <head>
+ <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
+ <meta charset='utf-8'>
+ <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
+ <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
+ <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
+ <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and swap-origin redirection from http context.">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/security-features/resources/common.js"></script>
+ <script src="/referrer-policy/generic/test-case.sub.js"></script>
+ </head>
+ <body>
+ <script>
+ TestCase(
+ {
+ "expectation": "stripped-referrer",
+ "origin": "same-https",
+ "redirection": "swap-origin",
+ "source_context_list": [],
+ "source_scheme": "http",
+ "subresource": "xhr",
+ "subresource_policy_deliveries": []
+ },
+ document.querySelector("meta[name=assert]").content,
+ new SanityChecker()
+ ).start();
+ </script>
+ <div id="log"></div>
+ </body>
+</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/generic/referrer-policy-test-case.sub.js b/tests/wpt/web-platform-tests/referrer-policy/generic/referrer-policy-test-case.sub.js
index 972ce8de066..4722b0b1b8b 100644
--- a/tests/wpt/web-platform-tests/referrer-policy/generic/referrer-policy-test-case.sub.js
+++ b/tests/wpt/web-platform-tests/referrer-policy/generic/referrer-policy-test-case.sub.js
@@ -51,6 +51,41 @@ function stripUrlForUseAsReferrer(url) {
return url.replace(/#.*$/, "");
}
+function invokeScenario(scenario, sourceContextList) {
+ const originTypeConversion = {
+ "same-origin-http": "same-http",
+ "same-origin-https": "same-https",
+ "cross-origin-http": "cross-http",
+ "cross-origin-https": "cross-https"
+ };
+ const urls = getRequestURLs(
+ scenario.subresource,
+ originTypeConversion[scenario.origin + '-' + scenario.target_protocol],
+ scenario.redirection);
+
+ const deliveryTypeConversion = {
+ "attr-referrer": "attr",
+ "rel-noreferrer": "rel-noref",
+ // Other delivery methods such as "http-rp" are ignored here because
+ // they are already applied to the main document by generator.py.
+ };
+
+ /** @type {PolicyDelivery} */
+ const delivery = {
+ deliveryType: deliveryTypeConversion[scenario.delivery_method],
+ key: "referrerPolicy",
+ value: scenario.referrer_policy};
+
+ /** @type {Subresource} */
+ const subresource = {
+ subresourceType: scenario.subresource,
+ url: urls.testUrl,
+ policyDeliveries: [delivery]
+ };
+
+ return invokeRequest(subresource, sourceContextList || []);
+}
+
function ReferrerPolicyTestCase(scenario, testDescription, sanityChecker) {
// Pass and skip rest of the test if browser does not support fetch.
if (scenario.subresource == "fetch-request" && !window.fetch) {
@@ -66,17 +101,6 @@ function ReferrerPolicyTestCase(scenario, testDescription, sanityChecker) {
// This check is A NOOP in release.
sanityChecker.checkScenario(scenario);
- const originTypeConversion = {
- "same-origin-http": "same-http",
- "same-origin-https": "same-https",
- "cross-origin-http": "cross-http",
- "cross-origin-https": "cross-https"
- };
- const urls = getRequestURLs(
- scenario.subresource,
- originTypeConversion[scenario.origin + '-' + scenario.target_protocol],
- scenario.redirection);
-
const referrerUrlResolver = {
"omitted": function(sourceUrl) {
return undefined;
@@ -89,15 +113,16 @@ function ReferrerPolicyTestCase(scenario, testDescription, sanityChecker) {
}
};
- const checkResult = (expectedReferrerUrl, result) => {
- // Check if the result is in valid format. NOOP in release.
- sanityChecker.checkSubresourceResult(scenario, urls.testUrl, result);
+ const checkResult = (expectation, result) => {
+ let currentURL = location.toString();
+ const expectedReferrerUrl =
+ referrerUrlResolver[expectation](currentURL);
// Check the reported URL.
assert_equals(result.referrer,
expectedReferrerUrl,
"Reported Referrer URL is '" +
- scenario.referrer_url + "'.");
+ expectation + "'.");
assert_equals(result.headers.referer,
expectedReferrerUrl,
"Reported Referrer URL from HTTP header is '" +
@@ -105,30 +130,6 @@ function ReferrerPolicyTestCase(scenario, testDescription, sanityChecker) {
};
function runTest() {
- const deliveryTypeConversion = {
- "attr-referrer": "attr",
- "rel-noreferrer": "rel-noref",
- // Other delivery methods such as "http-rp" are ignored here because
- // they are already applied to the main document by generator.py.
- };
-
- /** @type {PolicyDelivery} */
- const delivery = {
- deliveryType: deliveryTypeConversion[scenario.delivery_method],
- key: "referrerPolicy",
- value: scenario.referrer_policy};
-
- /** @type {Subresource} */
- const subresource = {
- subresourceType: scenario.subresource,
- url: urls.testUrl,
- policyDeliveries: [delivery]
- };
-
- let currentURL = location.toString();
- const expectedReferrer =
- referrerUrlResolver[scenario.referrer_url](currentURL);
-
function historyBackPromise(t, scenario) {
history.back();
return new Promise(resolve => {
@@ -148,43 +149,37 @@ function ReferrerPolicyTestCase(scenario, testDescription, sanityChecker) {
// Request in the top-level document.
promise_test(_ => {
- return invokeRequest(subresource, [])
- .then(result => checkResult(expectedReferrer, result));
+ return invokeScenario(scenario)
+ .then(result => checkResult(scenario.referrer_url, result));
}, testDescription);
- // `Referer` headers with length over 4k are culled down to an origin, so, let's test around
- // that boundary for tests that would otherwise return the complete URL.
+ // `Referer` headers with length over 4k are culled down to an origin, so,
+ // let's test around that boundary for tests that would otherwise return
+ // the complete URL.
+ // Different subresource URLs are used because getRequestURLs() is called
+ // for each sub test which returns a unique URL.
if (scenario.referrer_url == "stripped-referrer") {
promise_test(t => {
history.pushState(null, null, "/");
history.replaceState(null, null, "A".repeat(4096 - location.href.length - 1));
- const expectedReferrer = location.href;
- // Ensure that we don't load the same URL as the previous test.
- subresource.url += "&-1";
- return invokeRequest(subresource, [])
- .then(result => checkResult(location.href, result))
+ return invokeScenario(scenario)
+ .then(result => checkResult(scenario.referrer_url, result))
.finally(_ => historyBackPromise(t, scenario));
}, "`Referer` header with length < 4k is not stripped to an origin.");
promise_test(t => {
history.pushState(null, null, "/");
history.replaceState(null, null, "A".repeat(4096 - location.href.length));
- const expectedReferrer = location.href;
- // Ensure that we don't load the same URL as the previous test.
- subresource.url += "&0";
- return invokeRequest(subresource, [])
- .then(result => checkResult(expectedReferrer, result))
+ return invokeScenario(scenario)
+ .then(result => checkResult(scenario.referrer_url, result))
.finally(_ => historyBackPromise(t, scenario));
}, "`Referer` header with length == 4k is not stripped to an origin.");
promise_test(t => {
- const originString = referrerUrlResolver["origin"](currentURL);
history.pushState(null, null, "/");
history.replaceState(null, null, "A".repeat(4096 - location.href.length + 1));
- // Ensure that we don't load the same URL as the previous test.
- subresource.url += "&+1";
- return invokeRequest(subresource, [])
- .then(result => checkResult(originString, result))
+ return invokeScenario(scenario)
+ .then(result => checkResult("origin", result))
.finally(_ => historyBackPromise(t, scenario));
}, "`Referer` header with length > 4k is stripped to an origin.");
}
@@ -196,16 +191,40 @@ function ReferrerPolicyTestCase(scenario, testDescription, sanityChecker) {
return;
}
+ // We skip <srcdoc> tests for attr-referrer, because delivering referrer
+ // policy via DOM attributes inside <srcdoc> is quite similar to doing
+ // so in the top-level Document.
+ if (scenario.delivery_method === "attr-referrer") {
+ return;
+ }
+
// Request in a `srcdoc` frame to ensure that it uses the referrer
// policy of its parent,
promise_test(_ => {
/** @type {Array<SourceContext>} */
const sourceContextList = [{sourceContextType: "srcdoc"}];
- return invokeRequest(subresource, sourceContextList)
- .then(result => checkResult(expectedReferrer, result));
+ return invokeScenario(scenario, sourceContextList)
+ .then(result => checkResult(scenario.referrer_url, result));
}, testDescription + " (srcdoc iframe inherits parent)");
+ // We skip (top Document w/ referrer policy by HTTP headers)->
+ // (<iframe srcdoc> w/ overriding referrer policy) tests, because we
+ // already have similar (top Document w/ referrer policy by <meta>)->
+ // (<iframe srcdoc> w/ overriding referrer policy) tests.
+ if (scenario.delivery_method === "http-rp") {
+ return;
+ }
+
+ // We skip (top Document w/o referrer policy)->
+ // (<iframe srcdoc> w/ overriding referrer policy) tests, to simplify the
+ // generator. We already have (top Document w/ referrer policy)->
+ // (<iframe srcdoc> w/ overriding referrer policy) tests, which verify the
+ // <iframe srcdoc>'s referrer policy behavior.
+ if (scenario.referrer_policy === null) {
+ return;
+ }
+
// Request in a `srcdoc` frame with its own referrer policy to
// override its parent.
promise_test(_ => {
@@ -214,16 +233,14 @@ function ReferrerPolicyTestCase(scenario, testDescription, sanityChecker) {
const overridingPolicy =
scenario.referrer_policy === "no-referrer" ? "unsafe-url"
: "no-referrer";
- const overrridingExpectedReferrer =
- referrerUrlResolver[overridingPolicy === "no-referrer"
- ? "omitted"
- : "stripped-referrer"](location.toString());
+ const overrridingExpectation =
+ overridingPolicy === "no-referrer" ? "omitted"
+ : "stripped-referrer";
- /** @type {Subresource} */
- const subresourceWithoutDelivery = {
- subresourceType: scenario.subresource,
- url: urls.testUrl
- };
+ const scenarioWithoutDelivery = Object.assign({}, scenario);
+ // Omit policy deliveries applied to subresource requests.
+ // This is hacky method but will be removed soon.
+ scenarioWithoutDelivery.delivery_method = null;
// <iframe srcdoc> with overriding <meta> referrerPolicy.
/** @type {Array<SourceContext>} */
@@ -234,8 +251,8 @@ function ReferrerPolicyTestCase(scenario, testDescription, sanityChecker) {
value: overridingPolicy}]
}];
- return invokeRequest(subresourceWithoutDelivery, sourceContextList)
- .then(result => checkResult(overrridingExpectedReferrer, result));
+ return invokeScenario(scenarioWithoutDelivery, sourceContextList)
+ .then(result => checkResult(overrridingExpectation, result));
}, testDescription + " (overridden by srcdoc iframe)");
}
diff --git a/tests/wpt/web-platform-tests/referrer-policy/generic/test-case.sub.js b/tests/wpt/web-platform-tests/referrer-policy/generic/test-case.sub.js
new file mode 100644
index 00000000000..356f8054f6e
--- /dev/null
+++ b/tests/wpt/web-platform-tests/referrer-policy/generic/test-case.sub.js
@@ -0,0 +1,203 @@
+// TODO: This function is currently placed and duplicated at:
+// - mixed-content/generic/mixed-content-test-case.js
+// - referrer-policy/generic/referrer-policy-test-case.sub.js
+// but should be moved to /common/security-features/resources/common.js.
+function getSubresourceOrigin(originType) {
+ const httpProtocol = "http";
+ const httpsProtocol = "https";
+ const wsProtocol = "ws";
+ const wssProtocol = "wss";
+
+ const sameOriginHost = "{{host}}";
+ const crossOriginHost = "{{domains[www1]}}";
+
+ // These values can evaluate to either empty strings or a ":port" string.
+ const httpPort = getNormalizedPort(parseInt("{{ports[http][0]}}", 10));
+ const httpsPort = getNormalizedPort(parseInt("{{ports[https][0]}}", 10));
+ const wsPort = getNormalizedPort(parseInt("{{ports[ws][0]}}", 10));
+ const wssPort = getNormalizedPort(parseInt("{{ports[wss][0]}}", 10));
+
+ /**
+ @typedef OriginType
+ @type {string}
+
+ Represents the origin of the subresource request URL.
+ The keys of `originMap` below are the valid values.
+
+ Note that there can be redirects from the specified origin
+ (see RedirectionType), and thus the origin of the subresource
+ response URL might be different from what is specified by OriginType.
+ */
+ const originMap = {
+ "same-https": httpsProtocol + "://" + sameOriginHost + httpsPort,
+ "same-http": httpProtocol + "://" + sameOriginHost + httpPort,
+ "cross-https": httpsProtocol + "://" + crossOriginHost + httpsPort,
+ "cross-http": httpProtocol + "://" + crossOriginHost + httpPort,
+ "same-wss": wssProtocol + "://" + sameOriginHost + wssPort,
+ "same-ws": wsProtocol + "://" + sameOriginHost + wsPort,
+ "cross-wss": wssProtocol + "://" + crossOriginHost + wssPort,
+ "cross-ws": wsProtocol + "://" + crossOriginHost + wsPort,
+ };
+
+ return originMap[originType];
+}
+
+// NOTE: This method only strips the fragment and is not in accordance to the
+// recommended draft specification:
+// https://w3c.github.io/webappsec/specs/referrer-policy/#null
+// TODO(kristijanburnik): Implement this helper as defined by spec once added
+// scenarios for URLs containing username/password/etc.
+function stripUrlForUseAsReferrer(url) {
+ return url.replace(/#.*$/, "");
+}
+
+function invokeScenario(scenario) {
+ const redirectionTypeConversion = {
+ "no-redirect": "no-redirect",
+ "keep-scheme": "keep-scheme-redirect",
+ "swap-scheme": "swap-scheme-redirect",
+ "keep-origin": "keep-origin-redirect",
+ "swap-origin": "swap-origin-redirect"
+ };
+ const subresourceTypeConversion = {
+ "beacon": "beacon-request",
+ "fetch": "fetch-request",
+ "xhr": "xhr-request",
+ "websocket": "websocket-request",
+ "worker-classic": "worker-request",
+ "worker-module": "module-worker",
+ "worker-import-data": "module-data-worker-import",
+ "sharedworker-classic": "shared-worker",
+ "worklet-animation": "worklet-animation-top-level",
+ "worklet-audio": "worklet-audio-top-level",
+ "worklet-layout": "worklet-layout-top-level",
+ "worklet-paint": "worklet-paint-top-level",
+ "worklet-animation-import-data": "worklet-animation-data-import",
+ "worklet-audio-import-data": "worklet-audio-data-import",
+ "worklet-layout-import-data": "worklet-layout-data-import",
+ "worklet-paint-import-data": "worklet-paint-data-import"
+ };
+ const subresourceType =
+ subresourceTypeConversion[scenario.subresource] || scenario.subresource;
+ const urls = getRequestURLs(
+ subresourceType,
+ scenario.origin,
+ redirectionTypeConversion[scenario.redirection]);
+ /** @type {Subresource} */
+ const subresource = {
+ subresourceType: subresourceType,
+ url: urls.testUrl,
+ policyDeliveries: scenario.subresource_policy_deliveries,
+ };
+
+ return invokeRequest(subresource, scenario.source_context_list);
+}
+
+function TestCase(scenario, testDescription, sanityChecker) {
+ // This check is A NOOP in release.
+ sanityChecker.checkScenario(scenario);
+
+ const referrerUrlResolver = {
+ "omitted": function(sourceUrl) {
+ return undefined;
+ },
+ "origin": function(sourceUrl) {
+ return new URL(sourceUrl).origin + "/";
+ },
+ "stripped-referrer": function(sourceUrl) {
+ return stripUrlForUseAsReferrer(sourceUrl);
+ }
+ };
+
+ const checkResult = (expectation, result) => {
+ // https://w3c.github.io/webappsec-referrer-policy/#determine-requests-referrer
+ let referrerSource = result.sourceContextUrl;
+ const sentFromSrcdoc = scenario.source_context_list.length > 0 &&
+ scenario.source_context_list[scenario.source_context_list.length - 1]
+ .sourceContextType === 'srcdoc';
+ if (sentFromSrcdoc) {
+ // Step 3. While document is an iframe srcdoc document, let document be
+ // document's browsing context's browsing context container's node
+ // document. [spec text]
+
+ // Workaround for srcdoc cases. Currently we only test <iframe srcdoc>
+ // inside the top-level Document, so |document| in the spec here is
+ // the top-level Document.
+ // This doesn't work if e.g. we test <iframe srcdoc> inside another
+ // external <iframe>.
+ referrerSource = location.toString();
+ }
+ const expectedReferrerUrl =
+ referrerUrlResolver[expectation](referrerSource);
+
+ // Check the reported URL.
+ assert_equals(result.referrer,
+ expectedReferrerUrl,
+ "Reported Referrer URL is '" +
+ expectation + "'.");
+ assert_equals(result.headers.referer,
+ expectedReferrerUrl,
+ "Reported Referrer URL from HTTP header is '" +
+ expectedReferrerUrl + "'");
+ };
+
+ function runTest() {
+ function historyBackPromise(t, scenario) {
+ history.back();
+ return new Promise(resolve => {
+ // Wait for completion of `history.back()` by listening the
+ // popstate events that are fired near the end of
+ // `history.back()` processing.
+ window.addEventListener('popstate', resolve, {once: true});
+
+ // Workaround for Safari: Waiting for popstate events causes
+ // timeout in a-tag tests. To avoid timeout, we anyway resolve
+ // the promise.
+ if (scenario.subresource === 'a-tag') {
+ t.step_timeout(resolve, 1000);
+ }
+ });
+ }
+
+ promise_test(_ => {
+ return invokeScenario(scenario)
+ .then(result => checkResult(scenario.expectation, result));
+ }, testDescription);
+
+ // `Referer` headers with length over 4k are culled down to an origin, so,
+ // let's test around that boundary for tests that would otherwise return
+ // the complete URL.
+ // The following tests run only on top-level Documents, because they rely
+ // on navigations using `history`.
+ // Different subresource URLs are used because getRequestURLs() is called
+ // for each sub test which returns a unique URL.
+ if (scenario.expectation == "stripped-referrer" &&
+ scenario.source_context_list.length == 0) {
+ promise_test(t => {
+ history.pushState(null, null, "/");
+ history.replaceState(null, null, "A".repeat(4096 - location.href.length - 1));
+ return invokeScenario(scenario)
+ .then(result => checkResult(scenario.expectation, result))
+ .finally(_ => historyBackPromise(t, scenario));
+ }, "`Referer` header with length < 4k is not stripped to an origin.");
+
+ promise_test(t => {
+ history.pushState(null, null, "/");
+ history.replaceState(null, null, "A".repeat(4096 - location.href.length));
+ return invokeScenario(scenario)
+ .then(result => checkResult(scenario.expectation, result))
+ .finally(_ => historyBackPromise(t, scenario));
+ }, "`Referer` header with length == 4k is not stripped to an origin.");
+
+ promise_test(t => {
+ history.pushState(null, null, "/");
+ history.replaceState(null, null, "A".repeat(4096 - location.href.length + 1));
+ return invokeScenario(scenario)
+ .then(result => checkResult("origin", result))
+ .finally(_ => historyBackPromise(t, scenario));
+ }, "`Referer` header with length > 4k is stripped to an origin.");
+ }
+ }
+
+ return {start: runTest};
+}
diff --git a/tests/wpt/web-platform-tests/referrer-policy/generic/tools/generate.py b/tests/wpt/web-platform-tests/referrer-policy/generic/tools/generate.py
index ba1e963787b..480603b9bd8 100755
--- a/tests/wpt/web-platform-tests/referrer-policy/generic/tools/generate.py
+++ b/tests/wpt/web-platform-tests/referrer-policy/generic/tools/generate.py
@@ -13,30 +13,25 @@ import generate
class ReferrerPolicyConfig(object):
def __init__(self):
- self.selection_pattern = '%(delivery_type)s/' + \
- '%(origin)s/' + \
- '%(source_scheme)s/' + \
- '%(subresource)s/' + \
- '%(redirection)s/'
+ self.selection_pattern = \
+ '%(source_context_list)s.%(delivery_type)s/' + \
+ '%(delivery_value)s/' + \
+ '%(subresource)s/' + \
+ '%(origin)s.%(redirection)s.%(source_scheme)s'
- self.test_file_path_pattern = '%(spec_name)s/' + self.selection_pattern + \
- '%(name)s.%(source_scheme)s.html'
+ self.test_file_path_pattern = 'gen/' + self.selection_pattern + '.html'
- self.test_description_template = '''The referrer URL is %(expectation)s when a
-document served over %(source_scheme)s requires a
-sub-resource via %(subresource)s using the %(delivery_type)s
-delivery method with %(redirection)s and when
-the target request is %(origin)s.'''
+ self.test_description_template = 'Referrer Policy: Expects %(expectation)s for %(subresource)s to %(origin)s origin and %(redirection)s redirection from %(source_scheme)s context.'
self.test_page_title_template = 'Referrer-Policy: %s'
- self.helper_js = '/referrer-policy/generic/referrer-policy-test-case.sub.js'
+ self.helper_js = '/referrer-policy/generic/test-case.sub.js'
# For debug target only.
self.sanity_checker_js = '/referrer-policy/generic/sanity-checker.js'
self.spec_json_js = '/referrer-policy/spec_json.js'
- self.test_case_name = 'ReferrerPolicyTestCase'
+ self.test_case_name = 'TestCase'
script_directory = os.path.dirname(os.path.abspath(__file__))
self.spec_directory = os.path.abspath(
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 8b77fb75247..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via fetch-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index f2152da955f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer-when-downgrade
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index 3e921ee2051..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via fetch-request using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index f2152da955f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer-when-downgrade
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index c7821aae3f6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via fetch-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index f2152da955f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer-when-downgrade
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index bae8956bf7d..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via iframe-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index f2152da955f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer-when-downgrade
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index c418c5a2714..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via iframe-tag using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index f2152da955f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer-when-downgrade
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index d8c7a5467c5..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via iframe-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index f2152da955f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer-when-downgrade
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 437a2c703c0..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via img-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index f2152da955f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer-when-downgrade
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index 5887e73ae7a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via img-tag using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index f2152da955f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer-when-downgrade
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index e320e6191b6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via img-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index f2152da955f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer-when-downgrade
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index fc100af0081..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via script-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index f2152da955f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer-when-downgrade
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index c9810465b2c..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via script-tag using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index f2152da955f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer-when-downgrade
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 71c95f870ff..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via script-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index f2152da955f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer-when-downgrade
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 9fe5ef8a619..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via xhr-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index f2152da955f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer-when-downgrade
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index 0901c1bc1f6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via xhr-request using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index f2152da955f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer-when-downgrade
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 3f3bcb557ef..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via xhr-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index f2152da955f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer-when-downgrade
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 51adeac1f15..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via fetch-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index f2152da955f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer-when-downgrade
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 97c8b34e5fb..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via fetch-request using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index f2152da955f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer-when-downgrade
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 67241ce4616..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via fetch-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index f2152da955f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer-when-downgrade
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index f60094da322..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via iframe-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index f2152da955f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer-when-downgrade
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 183e4dd4367..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via iframe-tag using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index f2152da955f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer-when-downgrade
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 5a3b4486d82..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via iframe-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index f2152da955f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer-when-downgrade
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 6144b6e19ba..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via img-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index f2152da955f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer-when-downgrade
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 4fe4fe8bc0d..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via img-tag using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index f2152da955f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer-when-downgrade
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 0ed931f885d..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via img-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index f2152da955f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer-when-downgrade
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 9be57e4a592..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via script-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index f2152da955f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer-when-downgrade
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 2df7c747290..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via script-tag using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index f2152da955f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer-when-downgrade
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 75d4b9fbe19..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via script-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index f2152da955f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer-when-downgrade
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 2a9392df1d6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via xhr-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index f2152da955f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer-when-downgrade
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 028ee939474..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via xhr-request using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index f2152da955f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer-when-downgrade
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 66e42d84e1b..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via xhr-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index f2152da955f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer-when-downgrade
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 7e988ffbc8e..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via fetch-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index f2152da955f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer-when-downgrade
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index 335fde0034b..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via fetch-request using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index f2152da955f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer-when-downgrade
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 3ab4e9b33a7..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via fetch-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index f2152da955f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer-when-downgrade
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index c8946d88a00..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via iframe-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index f2152da955f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer-when-downgrade
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index e79e8a05742..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via iframe-tag using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index f2152da955f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer-when-downgrade
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index cc5ea2700e1..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via iframe-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index f2152da955f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer-when-downgrade
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 759625f622c..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via img-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index f2152da955f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer-when-downgrade
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index 34c39041f99..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via img-tag using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index f2152da955f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer-when-downgrade
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 9301f0b2719..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via img-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index f2152da955f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer-when-downgrade
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 7b9a33f47e4..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via module-worker using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "module-worker",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index f2152da955f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer-when-downgrade
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/module-worker/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/module-worker/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index 3303e355a48..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/module-worker/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via module-worker using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "module-worker",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/module-worker/no-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/module-worker/no-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index f2152da955f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/module-worker/no-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer-when-downgrade
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 932ac4e18f9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via script-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index f2152da955f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer-when-downgrade
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index 32dac4bf4fa..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via script-tag using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index f2152da955f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer-when-downgrade
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 88a6f0b3283..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via script-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index f2152da955f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer-when-downgrade
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 0caca74b53d..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via shared-worker using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "shared-worker",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index f2152da955f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer-when-downgrade
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/shared-worker/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/shared-worker/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index f6215762acb..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/shared-worker/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via shared-worker using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "shared-worker",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/shared-worker/no-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/shared-worker/no-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index f2152da955f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/shared-worker/no-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer-when-downgrade
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 35123332a8a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via worker-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "worker-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index f2152da955f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer-when-downgrade
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/worker-request/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/worker-request/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index 757b06bc6ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/worker-request/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via worker-request using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "worker-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/worker-request/no-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/worker-request/no-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index f2152da955f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/worker-request/no-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer-when-downgrade
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 3044b007cd9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via xhr-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index f2152da955f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer-when-downgrade
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index 2f61fa770d7..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via xhr-request using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index f2152da955f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer-when-downgrade
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index fbbb9efd933..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via xhr-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index f2152da955f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer-when-downgrade
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 8a6ba540eea..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via fetch-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index f2152da955f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer-when-downgrade
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index de595abdeda..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via fetch-request using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index f2152da955f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer-when-downgrade
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 07a1ddc3a02..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via fetch-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index f2152da955f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer-when-downgrade
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 47c96588dbf..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via iframe-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index f2152da955f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer-when-downgrade
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index e047b17d411..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via iframe-tag using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index f2152da955f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer-when-downgrade
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 404e18bd654..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via iframe-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index f2152da955f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer-when-downgrade
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 246db457035..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via img-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index f2152da955f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer-when-downgrade
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 0a2a0f026c6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via img-tag using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index f2152da955f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer-when-downgrade
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index b35d8f7f4f1..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via img-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index f2152da955f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer-when-downgrade
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index aee79e7279e..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via script-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index f2152da955f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer-when-downgrade
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index e1ae930f78b..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via script-tag using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index f2152da955f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer-when-downgrade
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 5e871b80659..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via script-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index f2152da955f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer-when-downgrade
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index c606d407a3d..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via xhr-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index f2152da955f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer-when-downgrade
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index bb9ccab8126..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via xhr-request using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index f2152da955f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer-when-downgrade
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 4544ade5134..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via xhr-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index f2152da955f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer-when-downgrade
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 7205b5b5e20..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="no-referrer-when-downgrade">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via fetch-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index 2bd7f7f9f96..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="no-referrer-when-downgrade">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via fetch-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 6c941b98aff..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="no-referrer-when-downgrade">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via fetch-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 78a12c0faf7..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="no-referrer-when-downgrade">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via iframe-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index 8cb3b1da63c..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="no-referrer-when-downgrade">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via iframe-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 98b574b0334..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="no-referrer-when-downgrade">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via iframe-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 85b47db7c49..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="no-referrer-when-downgrade">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via script-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index e2b6315eed7..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="no-referrer-when-downgrade">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via script-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 8cd18a658d0..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="no-referrer-when-downgrade">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via script-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index db8b65c9070..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="no-referrer-when-downgrade">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via xhr-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index b37fab1c7d1..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="no-referrer-when-downgrade">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via xhr-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index a8967e2f007..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="no-referrer-when-downgrade">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via xhr-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 1a7931b1016..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="no-referrer-when-downgrade">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via fetch-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 7c80c012b34..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="no-referrer-when-downgrade">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via fetch-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 221dfb63ef9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="no-referrer-when-downgrade">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via fetch-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 6373a785fc2..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="no-referrer-when-downgrade">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via iframe-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 20f91bbeb1d..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="no-referrer-when-downgrade">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via iframe-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index c20b8e0eff6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="no-referrer-when-downgrade">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via iframe-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index e6f1a3e27c8..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="no-referrer-when-downgrade">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via script-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 4737eb59404..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="no-referrer-when-downgrade">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via script-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 41018d5e2c0..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="no-referrer-when-downgrade">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via script-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index adc9f952d66..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="no-referrer-when-downgrade">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via xhr-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 2210516aeca..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="no-referrer-when-downgrade">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via xhr-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 43fab7d5701..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="no-referrer-when-downgrade">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via xhr-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 1f280d02fb4..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="no-referrer-when-downgrade">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via fetch-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index 603daa98f17..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="no-referrer-when-downgrade">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via fetch-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 6ce64e62d24..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="no-referrer-when-downgrade">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via fetch-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 93075883216..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="no-referrer-when-downgrade">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via iframe-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index ef700be7505..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="no-referrer-when-downgrade">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via iframe-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 070e6a8817d..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="no-referrer-when-downgrade">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via iframe-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/module-worker/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/module-worker/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index f75b72157f4..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/module-worker/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="no-referrer-when-downgrade">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via module-worker using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "module-worker",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/module-worker/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/module-worker/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index f6367edbb22..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/module-worker/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="no-referrer-when-downgrade">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via module-worker using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "module-worker",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index c603a42b7c5..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="no-referrer-when-downgrade">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via script-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index 6d303558e7a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="no-referrer-when-downgrade">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via script-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 4436fc516bc..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="no-referrer-when-downgrade">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via script-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/shared-worker/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/shared-worker/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 20047defd66..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/shared-worker/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="no-referrer-when-downgrade">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via shared-worker using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "shared-worker",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/shared-worker/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/shared-worker/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index 966abff838d..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/shared-worker/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="no-referrer-when-downgrade">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via shared-worker using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "shared-worker",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/worker-request/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/worker-request/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index c6ee143fc88..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/worker-request/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="no-referrer-when-downgrade">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via worker-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "worker-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/worker-request/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/worker-request/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index 7e239d69aff..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/worker-request/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="no-referrer-when-downgrade">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via worker-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "worker-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 31c3b79a581..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="no-referrer-when-downgrade">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via xhr-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index 6eed03783b2..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="no-referrer-when-downgrade">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via xhr-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 61a5e51e637..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="no-referrer-when-downgrade">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via xhr-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 7699f0f96b6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="no-referrer-when-downgrade">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via fetch-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 12f4286f8d8..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="no-referrer-when-downgrade">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via fetch-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index e44a4fc096e..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="no-referrer-when-downgrade">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via fetch-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 6a338aa72ce..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="no-referrer-when-downgrade">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via iframe-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 5c81707fb55..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="no-referrer-when-downgrade">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via iframe-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 90c65ae6e87..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="no-referrer-when-downgrade">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via iframe-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index ee71a0d6f04..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="no-referrer-when-downgrade">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via script-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index efe2c0d2f95..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="no-referrer-when-downgrade">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via script-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 83ca9017551..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="no-referrer-when-downgrade">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via script-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index c902ffc410f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="no-referrer-when-downgrade">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via xhr-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 7bfc7656576..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="no-referrer-when-downgrade">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via xhr-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index c85180f01e1..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="no-referrer-when-downgrade">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via xhr-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer-when-downgrade",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html
deleted file mode 100644
index c5726ef3701..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via fetch-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 9b531426e5a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/fetch-request/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/fetch-request/no-redirect/generic.http.html
deleted file mode 100644
index a851d5bd818..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/fetch-request/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via fetch-request using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/fetch-request/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/fetch-request/no-redirect/generic.http.html.headers
deleted file mode 100644
index 9b531426e5a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/fetch-request/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html
deleted file mode 100644
index 54e6d020281..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via fetch-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 9b531426e5a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 8250944c36f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via iframe-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 9b531426e5a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html
deleted file mode 100644
index df0fe535c15..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via iframe-tag using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html.headers
deleted file mode 100644
index 9b531426e5a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html
deleted file mode 100644
index e56f9107aae..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via iframe-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 9b531426e5a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html
deleted file mode 100644
index a47e2e0c615..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via img-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 9b531426e5a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/img-tag/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/img-tag/no-redirect/generic.http.html
deleted file mode 100644
index 3dd2c1247dc..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/img-tag/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via img-tag using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/img-tag/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/img-tag/no-redirect/generic.http.html.headers
deleted file mode 100644
index 9b531426e5a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/img-tag/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html
deleted file mode 100644
index 256db1aa584..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via img-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 9b531426e5a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 7c05f53f14f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via script-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 9b531426e5a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/script-tag/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/script-tag/no-redirect/generic.http.html
deleted file mode 100644
index 83a91abf2bd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/script-tag/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via script-tag using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/script-tag/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/script-tag/no-redirect/generic.http.html.headers
deleted file mode 100644
index 9b531426e5a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/script-tag/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html
deleted file mode 100644
index 461fce61eef..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via script-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 9b531426e5a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 9d5a65e3171..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via xhr-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 9b531426e5a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/xhr-request/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/xhr-request/no-redirect/generic.http.html
deleted file mode 100644
index 26912186351..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/xhr-request/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via xhr-request using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/xhr-request/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/xhr-request/no-redirect/generic.http.html.headers
deleted file mode 100644
index 9b531426e5a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/xhr-request/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html
deleted file mode 100644
index d67f6bdbfba..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via xhr-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 9b531426e5a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html
deleted file mode 100644
index bfd73c92dc6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via fetch-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 9b531426e5a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/fetch-request/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/fetch-request/no-redirect/generic.http.html
deleted file mode 100644
index 4b61d4478a5..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/fetch-request/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via fetch-request using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/fetch-request/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/fetch-request/no-redirect/generic.http.html.headers
deleted file mode 100644
index 9b531426e5a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/fetch-request/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html
deleted file mode 100644
index eb4e0b3414d..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via fetch-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 9b531426e5a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 7ebd1199cc1..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via iframe-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 9b531426e5a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html
deleted file mode 100644
index 45675268814..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via iframe-tag using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html.headers
deleted file mode 100644
index 9b531426e5a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html
deleted file mode 100644
index fecf19ce75a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via iframe-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 9b531426e5a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 8a07db8736e..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via img-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 9b531426e5a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/img-tag/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/img-tag/no-redirect/generic.http.html
deleted file mode 100644
index ab0b3501c39..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/img-tag/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via img-tag using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/img-tag/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/img-tag/no-redirect/generic.http.html.headers
deleted file mode 100644
index 9b531426e5a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/img-tag/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html
deleted file mode 100644
index 3493ca250b8..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via img-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 9b531426e5a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html
deleted file mode 100644
index fe714d038bc..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via script-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 9b531426e5a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/script-tag/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/script-tag/no-redirect/generic.http.html
deleted file mode 100644
index 82002683fc9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/script-tag/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via script-tag using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/script-tag/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/script-tag/no-redirect/generic.http.html.headers
deleted file mode 100644
index 9b531426e5a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/script-tag/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html
deleted file mode 100644
index f84861f792a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via script-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 9b531426e5a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 8482c8ae977..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via xhr-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 9b531426e5a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/xhr-request/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/xhr-request/no-redirect/generic.http.html
deleted file mode 100644
index 48168636f42..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/xhr-request/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via xhr-request using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/xhr-request/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/xhr-request/no-redirect/generic.http.html.headers
deleted file mode 100644
index 9b531426e5a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/xhr-request/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html
deleted file mode 100644
index aa3455bc2df..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via xhr-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 9b531426e5a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html
deleted file mode 100644
index ed2159b6473..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via fetch-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 9b531426e5a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/fetch-request/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/fetch-request/no-redirect/generic.http.html
deleted file mode 100644
index 4495c5440cb..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/fetch-request/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via fetch-request using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/fetch-request/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/fetch-request/no-redirect/generic.http.html.headers
deleted file mode 100644
index 9b531426e5a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/fetch-request/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html
deleted file mode 100644
index eb067ac7967..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via fetch-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 9b531426e5a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 72b43aa9936..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via iframe-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 9b531426e5a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/iframe-tag/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/iframe-tag/no-redirect/generic.http.html
deleted file mode 100644
index d2cf0366dca..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/iframe-tag/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via iframe-tag using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/iframe-tag/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/iframe-tag/no-redirect/generic.http.html.headers
deleted file mode 100644
index 9b531426e5a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/iframe-tag/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html
deleted file mode 100644
index 34d467754d9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via iframe-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 9b531426e5a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 637b156a282..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via img-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 9b531426e5a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/img-tag/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/img-tag/no-redirect/generic.http.html
deleted file mode 100644
index ad34824d58d..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/img-tag/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via img-tag using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/img-tag/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/img-tag/no-redirect/generic.http.html.headers
deleted file mode 100644
index 9b531426e5a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/img-tag/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html
deleted file mode 100644
index f89a079a552..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via img-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 9b531426e5a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 40e0fd0a810..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via module-worker using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "module-worker",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 9b531426e5a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/module-worker/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/module-worker/no-redirect/generic.http.html
deleted file mode 100644
index a8d3c3ed2b6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/module-worker/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via module-worker using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "module-worker",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/module-worker/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/module-worker/no-redirect/generic.http.html.headers
deleted file mode 100644
index 9b531426e5a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/module-worker/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html
deleted file mode 100644
index df047a0ff44..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via script-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 9b531426e5a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/script-tag/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/script-tag/no-redirect/generic.http.html
deleted file mode 100644
index 6454292d6f0..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/script-tag/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via script-tag using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/script-tag/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/script-tag/no-redirect/generic.http.html.headers
deleted file mode 100644
index 9b531426e5a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/script-tag/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html
deleted file mode 100644
index 9a9c91976d8..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via script-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 9b531426e5a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/generic.http.html
deleted file mode 100644
index fedae8b7f7b..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via shared-worker using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "shared-worker",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 9b531426e5a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/shared-worker/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/shared-worker/no-redirect/generic.http.html
deleted file mode 100644
index 31892705e0f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/shared-worker/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via shared-worker using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "shared-worker",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/shared-worker/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/shared-worker/no-redirect/generic.http.html.headers
deleted file mode 100644
index 9b531426e5a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/shared-worker/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/generic.http.html
deleted file mode 100644
index c3981366c5d..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via worker-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "worker-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 9b531426e5a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/worker-request/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/worker-request/no-redirect/generic.http.html
deleted file mode 100644
index daf2637065f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/worker-request/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via worker-request using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "worker-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/worker-request/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/worker-request/no-redirect/generic.http.html.headers
deleted file mode 100644
index 9b531426e5a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/worker-request/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html
deleted file mode 100644
index eb5e616ecd6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via xhr-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 9b531426e5a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/xhr-request/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/xhr-request/no-redirect/generic.http.html
deleted file mode 100644
index abbf8fcb914..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/xhr-request/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via xhr-request using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/xhr-request/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/xhr-request/no-redirect/generic.http.html.headers
deleted file mode 100644
index 9b531426e5a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/xhr-request/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html
deleted file mode 100644
index b5f28d2d671..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via xhr-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 9b531426e5a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html
deleted file mode 100644
index e40426f78a8..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via fetch-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 9b531426e5a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/fetch-request/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/fetch-request/no-redirect/generic.http.html
deleted file mode 100644
index a4bd83ad284..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/fetch-request/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via fetch-request using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/fetch-request/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/fetch-request/no-redirect/generic.http.html.headers
deleted file mode 100644
index 9b531426e5a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/fetch-request/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html
deleted file mode 100644
index 6696fba26b3..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via fetch-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 9b531426e5a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html
deleted file mode 100644
index fbb4fa45f7d..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via iframe-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 9b531426e5a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/iframe-tag/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/iframe-tag/no-redirect/generic.http.html
deleted file mode 100644
index 35af16f4dca..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/iframe-tag/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via iframe-tag using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/iframe-tag/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/iframe-tag/no-redirect/generic.http.html.headers
deleted file mode 100644
index 9b531426e5a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/iframe-tag/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html
deleted file mode 100644
index 0c1af722041..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via iframe-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 9b531426e5a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html
deleted file mode 100644
index d2bc6fd4842..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via img-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 9b531426e5a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/img-tag/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/img-tag/no-redirect/generic.http.html
deleted file mode 100644
index 7cdfc9bd414..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/img-tag/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via img-tag using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/img-tag/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/img-tag/no-redirect/generic.http.html.headers
deleted file mode 100644
index 9b531426e5a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/img-tag/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html
deleted file mode 100644
index 6a1d773f91b..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via img-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 9b531426e5a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 47c4a60aed7..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via script-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 9b531426e5a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/script-tag/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/script-tag/no-redirect/generic.http.html
deleted file mode 100644
index 9e95ed2ef1b..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/script-tag/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via script-tag using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/script-tag/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/script-tag/no-redirect/generic.http.html.headers
deleted file mode 100644
index 9b531426e5a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/script-tag/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html
deleted file mode 100644
index 2a897d97add..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via script-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 9b531426e5a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 507432c9db1..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via xhr-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 9b531426e5a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/xhr-request/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/xhr-request/no-redirect/generic.http.html
deleted file mode 100644
index 1a6cf6884b9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/xhr-request/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via xhr-request using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/xhr-request/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/xhr-request/no-redirect/generic.http.html.headers
deleted file mode 100644
index 9b531426e5a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/xhr-request/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html
deleted file mode 100644
index 2b7beb3a4bb..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via xhr-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 9b531426e5a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: no-referrer
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 43df09f493c..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <meta name="referrer" content="no-referrer">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via fetch-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/fetch-request/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/fetch-request/no-redirect/generic.http.html
deleted file mode 100644
index 346c0165cf2..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/fetch-request/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <meta name="referrer" content="no-referrer">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via fetch-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html
deleted file mode 100644
index 9c19546b28b..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <meta name="referrer" content="no-referrer">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via fetch-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html
deleted file mode 100644
index dc74b170064..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <meta name="referrer" content="no-referrer">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via iframe-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html
deleted file mode 100644
index 0726049eefc..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <meta name="referrer" content="no-referrer">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via iframe-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html
deleted file mode 100644
index 93b5b91c161..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <meta name="referrer" content="no-referrer">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via iframe-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 6b094f9b36e..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <meta name="referrer" content="no-referrer">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via script-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/script-tag/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/script-tag/no-redirect/generic.http.html
deleted file mode 100644
index fa473268c6d..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/script-tag/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <meta name="referrer" content="no-referrer">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via script-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html
deleted file mode 100644
index 2f8afbe8aed..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <meta name="referrer" content="no-referrer">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via script-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 65cafa2b4f9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <meta name="referrer" content="no-referrer">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via xhr-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/xhr-request/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/xhr-request/no-redirect/generic.http.html
deleted file mode 100644
index 21a26882771..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/xhr-request/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <meta name="referrer" content="no-referrer">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via xhr-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html
deleted file mode 100644
index ce35564bf9d..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <meta name="referrer" content="no-referrer">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via xhr-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 47aaeb0646d..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <meta name="referrer" content="no-referrer">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via fetch-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/fetch-request/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/fetch-request/no-redirect/generic.http.html
deleted file mode 100644
index 1e3252924fe..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/fetch-request/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <meta name="referrer" content="no-referrer">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via fetch-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html
deleted file mode 100644
index e09bacfa6fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <meta name="referrer" content="no-referrer">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via fetch-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html
deleted file mode 100644
index ec641955cab..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <meta name="referrer" content="no-referrer">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via iframe-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html
deleted file mode 100644
index 298ed876f0a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <meta name="referrer" content="no-referrer">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via iframe-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html
deleted file mode 100644
index c80d5bfd080..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <meta name="referrer" content="no-referrer">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via iframe-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 6b4d7aaf3d0..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <meta name="referrer" content="no-referrer">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via script-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/script-tag/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/script-tag/no-redirect/generic.http.html
deleted file mode 100644
index 02f1cec108a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/script-tag/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <meta name="referrer" content="no-referrer">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via script-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html
deleted file mode 100644
index 3ab475dd62f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <meta name="referrer" content="no-referrer">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via script-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 180cf23b63f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <meta name="referrer" content="no-referrer">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via xhr-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/xhr-request/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/xhr-request/no-redirect/generic.http.html
deleted file mode 100644
index fb63204561f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/xhr-request/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <meta name="referrer" content="no-referrer">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via xhr-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html
deleted file mode 100644
index 856c6e24e13..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <meta name="referrer" content="no-referrer">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via xhr-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 1fdff5963da..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <meta name="referrer" content="no-referrer">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via fetch-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/fetch-request/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/fetch-request/no-redirect/generic.http.html
deleted file mode 100644
index 05c28a5475d..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/fetch-request/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <meta name="referrer" content="no-referrer">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via fetch-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html
deleted file mode 100644
index c60ecc104a8..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <meta name="referrer" content="no-referrer">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via fetch-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 8d81edd0440..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <meta name="referrer" content="no-referrer">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via iframe-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/iframe-tag/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/iframe-tag/no-redirect/generic.http.html
deleted file mode 100644
index a5a728cf86b..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/iframe-tag/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <meta name="referrer" content="no-referrer">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via iframe-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html
deleted file mode 100644
index df4f87235d0..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <meta name="referrer" content="no-referrer">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via iframe-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/module-worker/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/module-worker/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 2ce35a6ee3c..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/module-worker/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <meta name="referrer" content="no-referrer">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via module-worker using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "module-worker",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/module-worker/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/module-worker/no-redirect/generic.http.html
deleted file mode 100644
index bde8e0f0d13..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/module-worker/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <meta name="referrer" content="no-referrer">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via module-worker using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "module-worker",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 6b5ea62e345..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <meta name="referrer" content="no-referrer">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via script-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/script-tag/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/script-tag/no-redirect/generic.http.html
deleted file mode 100644
index b39c40d1698..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/script-tag/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <meta name="referrer" content="no-referrer">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via script-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html
deleted file mode 100644
index ba4fe78409f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <meta name="referrer" content="no-referrer">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via script-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/shared-worker/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/shared-worker/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 9b6574020c6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/shared-worker/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <meta name="referrer" content="no-referrer">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via shared-worker using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "shared-worker",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/shared-worker/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/shared-worker/no-redirect/generic.http.html
deleted file mode 100644
index 544426d28c6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/shared-worker/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <meta name="referrer" content="no-referrer">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via shared-worker using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "shared-worker",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/worker-request/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/worker-request/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 833d0f69136..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/worker-request/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <meta name="referrer" content="no-referrer">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via worker-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "worker-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/worker-request/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/worker-request/no-redirect/generic.http.html
deleted file mode 100644
index 55709bb0db2..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/worker-request/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <meta name="referrer" content="no-referrer">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via worker-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "worker-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html
deleted file mode 100644
index a4919c0f7dc..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <meta name="referrer" content="no-referrer">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via xhr-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/xhr-request/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/xhr-request/no-redirect/generic.http.html
deleted file mode 100644
index 9da55918ae3..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/xhr-request/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <meta name="referrer" content="no-referrer">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via xhr-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html
deleted file mode 100644
index 9884fb1f072..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <meta name="referrer" content="no-referrer">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via xhr-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 5a27c133476..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <meta name="referrer" content="no-referrer">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via fetch-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/fetch-request/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/fetch-request/no-redirect/generic.http.html
deleted file mode 100644
index 915801c177d..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/fetch-request/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <meta name="referrer" content="no-referrer">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via fetch-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html
deleted file mode 100644
index 504092c875f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <meta name="referrer" content="no-referrer">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via fetch-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html
deleted file mode 100644
index f128c96d648..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <meta name="referrer" content="no-referrer">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via iframe-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/generic.http.html
deleted file mode 100644
index 9ffd13b1c9f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <meta name="referrer" content="no-referrer">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via iframe-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html
deleted file mode 100644
index c3bc40e34b8..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <meta name="referrer" content="no-referrer">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via iframe-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 6219c76898f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <meta name="referrer" content="no-referrer">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via script-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/script-tag/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/script-tag/no-redirect/generic.http.html
deleted file mode 100644
index 3a2ea609daa..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/script-tag/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <meta name="referrer" content="no-referrer">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via script-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html
deleted file mode 100644
index c9bd5781db9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <meta name="referrer" content="no-referrer">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via script-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 28239d6b595..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <meta name="referrer" content="no-referrer">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via xhr-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/xhr-request/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/xhr-request/no-redirect/generic.http.html
deleted file mode 100644
index cabb0193e6d..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/xhr-request/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <meta name="referrer" content="no-referrer">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via xhr-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html
deleted file mode 100644
index 22147bafb08..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
- <meta name="description" content="Check that sub-resource never gets the referrer URL.">
- <meta name="referrer" content="no-referrer">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via xhr-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "no-referrer",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/cross-origin.http.html
deleted file mode 100644
index 3d02acfc5f9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via fetch-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/cross-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/cross-origin.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/cross-origin.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/no-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/no-redirect/cross-origin.http.html
deleted file mode 100644
index 4fc0a20ca2a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/no-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via fetch-request using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/no-redirect/cross-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/no-redirect/cross-origin.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/no-redirect/cross-origin.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/cross-origin.http.html
deleted file mode 100644
index 46ca3525e66..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via fetch-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/cross-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/cross-origin.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/cross-origin.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-origin.http.html
deleted file mode 100644
index 6367857969a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via iframe-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-origin.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-origin.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/no-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/no-redirect/cross-origin.http.html
deleted file mode 100644
index dc266208a24..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/no-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via iframe-tag using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/no-redirect/cross-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/no-redirect/cross-origin.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/no-redirect/cross-origin.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-origin.http.html
deleted file mode 100644
index ae9a1a24c96..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via iframe-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-origin.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-origin.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/cross-origin.http.html
deleted file mode 100644
index 3b0e4d177d7..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via img-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/cross-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/cross-origin.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/cross-origin.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/no-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/no-redirect/cross-origin.http.html
deleted file mode 100644
index fd2db5728fc..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/no-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via img-tag using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/no-redirect/cross-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/no-redirect/cross-origin.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/no-redirect/cross-origin.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/cross-origin.http.html
deleted file mode 100644
index b900db726c2..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via img-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/cross-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/cross-origin.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/cross-origin.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/cross-origin.http.html
deleted file mode 100644
index 62acabf41c5..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via script-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/cross-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/cross-origin.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/cross-origin.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/no-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/no-redirect/cross-origin.http.html
deleted file mode 100644
index ba056619102..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/no-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via script-tag using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/no-redirect/cross-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/no-redirect/cross-origin.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/no-redirect/cross-origin.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/cross-origin.http.html
deleted file mode 100644
index d86a85b208d..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via script-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/cross-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/cross-origin.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/cross-origin.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/cross-origin.http.html
deleted file mode 100644
index a5940fd6d94..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via xhr-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/cross-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/cross-origin.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/cross-origin.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/no-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/no-redirect/cross-origin.http.html
deleted file mode 100644
index e53a0ed387a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/no-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via xhr-request using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/no-redirect/cross-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/no-redirect/cross-origin.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/no-redirect/cross-origin.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/cross-origin.http.html
deleted file mode 100644
index ebba94e987d..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via xhr-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/cross-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/cross-origin.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/cross-origin.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/cross-origin.http.html
deleted file mode 100644
index 8ddd1581839..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via fetch-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/cross-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/cross-origin.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/cross-origin.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/no-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/no-redirect/cross-origin.http.html
deleted file mode 100644
index 3740814c441..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/no-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via fetch-request using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/no-redirect/cross-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/no-redirect/cross-origin.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/no-redirect/cross-origin.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/cross-origin.http.html
deleted file mode 100644
index 461c255ec90..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via fetch-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/cross-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/cross-origin.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/cross-origin.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/cross-origin.http.html
deleted file mode 100644
index f8cecd0d791..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via iframe-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/cross-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/cross-origin.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/cross-origin.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/no-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/no-redirect/cross-origin.http.html
deleted file mode 100644
index e1b46f72b9d..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/no-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via iframe-tag using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/no-redirect/cross-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/no-redirect/cross-origin.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/no-redirect/cross-origin.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/cross-origin.http.html
deleted file mode 100644
index 010656cfb05..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via iframe-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/cross-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/cross-origin.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/cross-origin.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/cross-origin.http.html
deleted file mode 100644
index 0feafdce56e..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via img-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/cross-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/cross-origin.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/cross-origin.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/no-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/no-redirect/cross-origin.http.html
deleted file mode 100644
index a72089286fb..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/no-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via img-tag using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/no-redirect/cross-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/no-redirect/cross-origin.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/no-redirect/cross-origin.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/cross-origin.http.html
deleted file mode 100644
index db330329909..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via img-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/cross-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/cross-origin.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/cross-origin.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/cross-origin.http.html
deleted file mode 100644
index 47e98f19d00..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via script-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/cross-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/cross-origin.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/cross-origin.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/no-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/no-redirect/cross-origin.http.html
deleted file mode 100644
index ddf8b522b59..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/no-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via script-tag using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/no-redirect/cross-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/no-redirect/cross-origin.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/no-redirect/cross-origin.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/cross-origin.http.html
deleted file mode 100644
index 17f72f72702..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via script-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/cross-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/cross-origin.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/cross-origin.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/cross-origin.http.html
deleted file mode 100644
index 4dbd0d1e8c5..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via xhr-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/cross-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/cross-origin.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/cross-origin.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/no-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/no-redirect/cross-origin.http.html
deleted file mode 100644
index 01b339b41d2..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/no-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via xhr-request using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/no-redirect/cross-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/no-redirect/cross-origin.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/no-redirect/cross-origin.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/cross-origin.http.html
deleted file mode 100644
index 07a972315fc..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via xhr-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/cross-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/cross-origin.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/cross-origin.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/same-origin-insecure.http.html
deleted file mode 100644
index befe72d9695..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via fetch-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/same-origin-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/same-origin-insecure.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/same-origin-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/no-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/no-redirect/same-origin-insecure.http.html
deleted file mode 100644
index b2eca76078f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/no-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via fetch-request using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/no-redirect/same-origin-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/no-redirect/same-origin-insecure.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/no-redirect/same-origin-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/same-origin-insecure.http.html
deleted file mode 100644
index 50768c30cf4..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via fetch-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/same-origin-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/same-origin-insecure.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/same-origin-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/same-origin-insecure.http.html
deleted file mode 100644
index 8fae2caef61..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via iframe-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/same-origin-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/same-origin-insecure.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/same-origin-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/no-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/no-redirect/same-origin-insecure.http.html
deleted file mode 100644
index 4a41087b095..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/no-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via iframe-tag using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/no-redirect/same-origin-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/no-redirect/same-origin-insecure.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/no-redirect/same-origin-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html
deleted file mode 100644
index b6a898c1ad2..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via iframe-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/same-origin-insecure.http.html
deleted file mode 100644
index a26f0dd202e..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via img-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/same-origin-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/same-origin-insecure.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/same-origin-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/no-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/no-redirect/same-origin-insecure.http.html
deleted file mode 100644
index 8b178d9990c..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/no-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via img-tag using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/no-redirect/same-origin-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/no-redirect/same-origin-insecure.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/no-redirect/same-origin-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/same-origin-insecure.http.html
deleted file mode 100644
index 0a46c97106b..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via img-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/same-origin-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/same-origin-insecure.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/same-origin-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/same-origin-insecure.http.html
deleted file mode 100644
index cc92566b86d..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via module-worker using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "module-worker",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/same-origin-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/same-origin-insecure.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/same-origin-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/module-worker/no-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/module-worker/no-redirect/same-origin-insecure.http.html
deleted file mode 100644
index 99927886521..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/module-worker/no-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via module-worker using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "module-worker",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/module-worker/no-redirect/same-origin-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/module-worker/no-redirect/same-origin-insecure.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/module-worker/no-redirect/same-origin-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/same-origin-insecure.http.html
deleted file mode 100644
index a7d6c72f08c..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via script-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/same-origin-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/same-origin-insecure.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/same-origin-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/no-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/no-redirect/same-origin-insecure.http.html
deleted file mode 100644
index c4df370a717..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/no-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via script-tag using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/no-redirect/same-origin-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/no-redirect/same-origin-insecure.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/no-redirect/same-origin-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/same-origin-insecure.http.html
deleted file mode 100644
index 8c45a5dac20..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via script-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/same-origin-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/same-origin-insecure.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/same-origin-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/same-origin-insecure.http.html
deleted file mode 100644
index bd13da2a292..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via shared-worker using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "shared-worker",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/same-origin-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/same-origin-insecure.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/same-origin-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/shared-worker/no-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/shared-worker/no-redirect/same-origin-insecure.http.html
deleted file mode 100644
index 3c53fa01167..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/shared-worker/no-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via shared-worker using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "shared-worker",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/shared-worker/no-redirect/same-origin-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/shared-worker/no-redirect/same-origin-insecure.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/shared-worker/no-redirect/same-origin-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/same-origin-insecure.http.html
deleted file mode 100644
index ec3e284c3c5..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via worker-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "worker-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/same-origin-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/same-origin-insecure.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/same-origin-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/worker-request/no-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/worker-request/no-redirect/same-origin-insecure.http.html
deleted file mode 100644
index e6854db2f3d..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/worker-request/no-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via worker-request using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "worker-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/worker-request/no-redirect/same-origin-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/worker-request/no-redirect/same-origin-insecure.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/worker-request/no-redirect/same-origin-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/same-origin-insecure.http.html
deleted file mode 100644
index 526c2648432..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via xhr-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/same-origin-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/same-origin-insecure.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/same-origin-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/no-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/no-redirect/same-origin-insecure.http.html
deleted file mode 100644
index bbf21e785f3..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/no-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via xhr-request using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/no-redirect/same-origin-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/no-redirect/same-origin-insecure.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/no-redirect/same-origin-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/same-origin-insecure.http.html
deleted file mode 100644
index 9cef48221ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via xhr-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/same-origin-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/same-origin-insecure.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/same-origin-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-upgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-upgrade.http.html
deleted file mode 100644
index 4b59071d48b..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-upgrade.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via fetch-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-upgrade.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-upgrade.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-upgrade.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/same-origin-upgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/same-origin-upgrade.http.html
deleted file mode 100644
index 0a8ce7cfe01..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/same-origin-upgrade.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via fetch-request using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/same-origin-upgrade.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/same-origin-upgrade.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/same-origin-upgrade.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-insecure.http.html
deleted file mode 100644
index 09f21bf5294..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via fetch-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-insecure.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-upgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-upgrade.http.html
deleted file mode 100644
index 53229010cfd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-upgrade.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via iframe-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-upgrade.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-upgrade.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-upgrade.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/same-origin-upgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/same-origin-upgrade.http.html
deleted file mode 100644
index 6a53bb812b3..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/same-origin-upgrade.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via iframe-tag using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/same-origin-upgrade.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/same-origin-upgrade.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/same-origin-upgrade.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html
deleted file mode 100644
index dd27004c1c4..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via iframe-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-upgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-upgrade.http.html
deleted file mode 100644
index 131c0e0893a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-upgrade.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via img-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-upgrade.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-upgrade.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-upgrade.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/no-redirect/same-origin-upgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/no-redirect/same-origin-upgrade.http.html
deleted file mode 100644
index 61753d6188a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/no-redirect/same-origin-upgrade.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via img-tag using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/no-redirect/same-origin-upgrade.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/no-redirect/same-origin-upgrade.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/no-redirect/same-origin-upgrade.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html
deleted file mode 100644
index e3cd0610003..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via img-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-upgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-upgrade.http.html
deleted file mode 100644
index 6c8a0fd643d..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-upgrade.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via script-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-upgrade.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-upgrade.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-upgrade.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/no-redirect/same-origin-upgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/no-redirect/same-origin-upgrade.http.html
deleted file mode 100644
index 5c6d59f53ec..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/no-redirect/same-origin-upgrade.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via script-tag using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/no-redirect/same-origin-upgrade.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/no-redirect/same-origin-upgrade.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/no-redirect/same-origin-upgrade.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html
deleted file mode 100644
index 4ccf6b24c82..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via script-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-upgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-upgrade.http.html
deleted file mode 100644
index 07887aa6a61..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-upgrade.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via xhr-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-upgrade.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-upgrade.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-upgrade.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/same-origin-upgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/same-origin-upgrade.http.html
deleted file mode 100644
index a226cfc9422..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/same-origin-upgrade.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via xhr-request using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/same-origin-upgrade.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/same-origin-upgrade.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/same-origin-upgrade.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-insecure.http.html
deleted file mode 100644
index 9d2cb261d6e..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via xhr-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-insecure.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/fetch-request/keep-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/fetch-request/keep-origin-redirect/cross-origin.http.html
deleted file mode 100644
index f95a61709ba..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/fetch-request/keep-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via fetch-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/fetch-request/no-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/fetch-request/no-redirect/cross-origin.http.html
deleted file mode 100644
index e5c4a5b9d70..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/fetch-request/no-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via fetch-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/fetch-request/swap-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/fetch-request/swap-origin-redirect/cross-origin.http.html
deleted file mode 100644
index 6b69d4f3399..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/fetch-request/swap-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via fetch-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-origin.http.html
deleted file mode 100644
index b36d8e43696..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via iframe-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/iframe-tag/no-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/iframe-tag/no-redirect/cross-origin.http.html
deleted file mode 100644
index cb22d1880e1..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/iframe-tag/no-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via iframe-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-origin.http.html
deleted file mode 100644
index 10c4f953428..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via iframe-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/cross-origin.http.html
deleted file mode 100644
index 9087f457aa7..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via script-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/script-tag/no-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/script-tag/no-redirect/cross-origin.http.html
deleted file mode 100644
index cfbb2478acd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/script-tag/no-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via script-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/cross-origin.http.html
deleted file mode 100644
index 562bc513b1b..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via script-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/xhr-request/keep-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/xhr-request/keep-origin-redirect/cross-origin.http.html
deleted file mode 100644
index 2aa2cdd9b4c..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/xhr-request/keep-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via xhr-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/xhr-request/no-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/xhr-request/no-redirect/cross-origin.http.html
deleted file mode 100644
index 92b2a2069cf..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/xhr-request/no-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via xhr-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/xhr-request/swap-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/xhr-request/swap-origin-redirect/cross-origin.http.html
deleted file mode 100644
index 9703cae9306..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/xhr-request/swap-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via xhr-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/fetch-request/keep-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/fetch-request/keep-origin-redirect/cross-origin.http.html
deleted file mode 100644
index 8f5342fc17a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/fetch-request/keep-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via fetch-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/fetch-request/no-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/fetch-request/no-redirect/cross-origin.http.html
deleted file mode 100644
index c4f1a54f2c6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/fetch-request/no-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via fetch-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/fetch-request/swap-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/fetch-request/swap-origin-redirect/cross-origin.http.html
deleted file mode 100644
index 1b961e3dfb4..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/fetch-request/swap-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via fetch-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/cross-origin.http.html
deleted file mode 100644
index 137aa7e3af8..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via iframe-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/iframe-tag/no-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/iframe-tag/no-redirect/cross-origin.http.html
deleted file mode 100644
index 1703a958e78..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/iframe-tag/no-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via iframe-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/cross-origin.http.html
deleted file mode 100644
index c3c98c4d440..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via iframe-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/cross-origin.http.html
deleted file mode 100644
index c1c349086bc..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via script-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/script-tag/no-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/script-tag/no-redirect/cross-origin.http.html
deleted file mode 100644
index a796ddbddc4..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/script-tag/no-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via script-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/cross-origin.http.html
deleted file mode 100644
index cd2d7972f0d..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via script-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/xhr-request/keep-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/xhr-request/keep-origin-redirect/cross-origin.http.html
deleted file mode 100644
index 592768a121e..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/xhr-request/keep-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via xhr-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/xhr-request/no-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/xhr-request/no-redirect/cross-origin.http.html
deleted file mode 100644
index 7824367f87b..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/xhr-request/no-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via xhr-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/xhr-request/swap-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/xhr-request/swap-origin-redirect/cross-origin.http.html
deleted file mode 100644
index 7f07485e08e..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/xhr-request/swap-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via xhr-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/fetch-request/keep-origin-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/fetch-request/keep-origin-redirect/same-origin-insecure.http.html
deleted file mode 100644
index 8d8aa7b1407..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/fetch-request/keep-origin-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via fetch-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/fetch-request/no-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/fetch-request/no-redirect/same-origin-insecure.http.html
deleted file mode 100644
index 585c54a5b78..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/fetch-request/no-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via fetch-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/fetch-request/swap-origin-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/fetch-request/swap-origin-redirect/same-origin-insecure.http.html
deleted file mode 100644
index 53e908467c8..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/fetch-request/swap-origin-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via fetch-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/same-origin-insecure.http.html
deleted file mode 100644
index 48e6c69b555..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via iframe-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/iframe-tag/no-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/iframe-tag/no-redirect/same-origin-insecure.http.html
deleted file mode 100644
index aa3dda32d62..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/iframe-tag/no-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via iframe-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html
deleted file mode 100644
index d319c671e1f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via iframe-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/module-worker/keep-origin-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/module-worker/keep-origin-redirect/same-origin-insecure.http.html
deleted file mode 100644
index 2127ef3ada6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/module-worker/keep-origin-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via module-worker using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "module-worker",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/module-worker/no-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/module-worker/no-redirect/same-origin-insecure.http.html
deleted file mode 100644
index cfb23ead044..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/module-worker/no-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via module-worker using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "module-worker",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/script-tag/keep-origin-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/script-tag/keep-origin-redirect/same-origin-insecure.http.html
deleted file mode 100644
index 57db10fef10..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/script-tag/keep-origin-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via script-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/script-tag/no-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/script-tag/no-redirect/same-origin-insecure.http.html
deleted file mode 100644
index e854d09454f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/script-tag/no-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via script-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/script-tag/swap-origin-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/script-tag/swap-origin-redirect/same-origin-insecure.http.html
deleted file mode 100644
index 58993fbddb9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/script-tag/swap-origin-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via script-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/shared-worker/keep-origin-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/shared-worker/keep-origin-redirect/same-origin-insecure.http.html
deleted file mode 100644
index 58588cbd89f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/shared-worker/keep-origin-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via shared-worker using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "shared-worker",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/shared-worker/no-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/shared-worker/no-redirect/same-origin-insecure.http.html
deleted file mode 100644
index 57abce25ec0..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/shared-worker/no-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via shared-worker using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "shared-worker",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/worker-request/keep-origin-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/worker-request/keep-origin-redirect/same-origin-insecure.http.html
deleted file mode 100644
index 73a9963f1f0..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/worker-request/keep-origin-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via worker-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "worker-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/worker-request/no-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/worker-request/no-redirect/same-origin-insecure.http.html
deleted file mode 100644
index e5d89fb2d20..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/worker-request/no-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via worker-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "worker-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/xhr-request/keep-origin-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/xhr-request/keep-origin-redirect/same-origin-insecure.http.html
deleted file mode 100644
index f69d366a327..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/xhr-request/keep-origin-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via xhr-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/xhr-request/no-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/xhr-request/no-redirect/same-origin-insecure.http.html
deleted file mode 100644
index ee0f051f770..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/xhr-request/no-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via xhr-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/xhr-request/swap-origin-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/xhr-request/swap-origin-redirect/same-origin-insecure.http.html
deleted file mode 100644
index ec455a6aef7..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/xhr-request/swap-origin-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via xhr-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-upgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-upgrade.http.html
deleted file mode 100644
index dc2c9d9ab75..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-upgrade.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via fetch-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/no-redirect/same-origin-upgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/no-redirect/same-origin-upgrade.http.html
deleted file mode 100644
index 9fbc08e5384..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/no-redirect/same-origin-upgrade.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via fetch-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-insecure.http.html
deleted file mode 100644
index 3f46fabe37b..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via fetch-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-upgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-upgrade.http.html
deleted file mode 100644
index 3ca5a0b0d7c..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-upgrade.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via iframe-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/same-origin-upgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/same-origin-upgrade.http.html
deleted file mode 100644
index a17b3ba8c17..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/same-origin-upgrade.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via iframe-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html
deleted file mode 100644
index fda77dbd15b..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via iframe-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-upgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-upgrade.http.html
deleted file mode 100644
index fb2ae653afe..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-upgrade.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via script-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/no-redirect/same-origin-upgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/no-redirect/same-origin-upgrade.http.html
deleted file mode 100644
index 13669d31a69..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/no-redirect/same-origin-upgrade.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via script-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html
deleted file mode 100644
index 0f8985d1427..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via script-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-upgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-upgrade.http.html
deleted file mode 100644
index 26434dd0a05..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-upgrade.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via xhr-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/no-redirect/same-origin-upgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/no-redirect/same-origin-upgrade.http.html
deleted file mode 100644
index 62e3849d679..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/no-redirect/same-origin-upgrade.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via xhr-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-insecure.http.html
deleted file mode 100644
index 6a09e53315a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via xhr-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 5577dd290e8..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via fetch-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 306a53536ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/fetch-request/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/fetch-request/no-redirect/generic.http.html
deleted file mode 100644
index 3dfd7e3526c..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/fetch-request/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via fetch-request using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/fetch-request/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/fetch-request/no-redirect/generic.http.html.headers
deleted file mode 100644
index 306a53536ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/fetch-request/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html
deleted file mode 100644
index 5fbda64f1df..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via fetch-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 306a53536ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html
deleted file mode 100644
index b498a7d7a31..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via iframe-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 306a53536ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html
deleted file mode 100644
index cf30937880f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via iframe-tag using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html.headers
deleted file mode 100644
index 306a53536ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html
deleted file mode 100644
index 5123048a961..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via iframe-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 306a53536ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 1a6b8711327..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via img-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 306a53536ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/img-tag/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/img-tag/no-redirect/generic.http.html
deleted file mode 100644
index 6ecead7d50e..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/img-tag/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via img-tag using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/img-tag/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/img-tag/no-redirect/generic.http.html.headers
deleted file mode 100644
index 306a53536ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/img-tag/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html
deleted file mode 100644
index abaf6d3efb8..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via img-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 306a53536ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 849754d0a23..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via script-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 306a53536ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/script-tag/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/script-tag/no-redirect/generic.http.html
deleted file mode 100644
index c9009ba9bb4..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/script-tag/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via script-tag using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/script-tag/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/script-tag/no-redirect/generic.http.html.headers
deleted file mode 100644
index 306a53536ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/script-tag/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html
deleted file mode 100644
index e10011d34f1..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via script-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 306a53536ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 3a8045104ba..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via xhr-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 306a53536ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/xhr-request/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/xhr-request/no-redirect/generic.http.html
deleted file mode 100644
index 7e4275cad39..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/xhr-request/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via xhr-request using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/xhr-request/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/xhr-request/no-redirect/generic.http.html.headers
deleted file mode 100644
index 306a53536ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/xhr-request/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html
deleted file mode 100644
index 130958a292a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via xhr-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 306a53536ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 35fa4d4e120..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via fetch-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 306a53536ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/fetch-request/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/fetch-request/no-redirect/generic.http.html
deleted file mode 100644
index 8bbdbcaf518..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/fetch-request/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via fetch-request using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/fetch-request/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/fetch-request/no-redirect/generic.http.html.headers
deleted file mode 100644
index 306a53536ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/fetch-request/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html
deleted file mode 100644
index f765d8e5ed4..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via fetch-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 306a53536ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 81abd80a316..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via iframe-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 306a53536ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html
deleted file mode 100644
index dce1889cdaf..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via iframe-tag using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html.headers
deleted file mode 100644
index 306a53536ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html
deleted file mode 100644
index 2d300936294..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via iframe-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 306a53536ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 7490ce2006c..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via img-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 306a53536ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/img-tag/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/img-tag/no-redirect/generic.http.html
deleted file mode 100644
index efa72adcc59..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/img-tag/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via img-tag using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/img-tag/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/img-tag/no-redirect/generic.http.html.headers
deleted file mode 100644
index 306a53536ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/img-tag/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html
deleted file mode 100644
index 6c5960010bb..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via img-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 306a53536ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html
deleted file mode 100644
index c3f9f1540c8..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via script-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 306a53536ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/script-tag/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/script-tag/no-redirect/generic.http.html
deleted file mode 100644
index 972258f7c09..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/script-tag/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via script-tag using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/script-tag/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/script-tag/no-redirect/generic.http.html.headers
deleted file mode 100644
index 306a53536ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/script-tag/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html
deleted file mode 100644
index a0b43f146fc..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via script-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 306a53536ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html
deleted file mode 100644
index e4b8632fdcd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via xhr-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 306a53536ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/xhr-request/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/xhr-request/no-redirect/generic.http.html
deleted file mode 100644
index f01ce4e0289..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/xhr-request/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via xhr-request using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/xhr-request/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/xhr-request/no-redirect/generic.http.html.headers
deleted file mode 100644
index 306a53536ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/xhr-request/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html
deleted file mode 100644
index f0d6a0fd054..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via xhr-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 306a53536ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html
deleted file mode 100644
index f62fcf98e40..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via fetch-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 306a53536ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/fetch-request/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/fetch-request/no-redirect/generic.http.html
deleted file mode 100644
index c6c6a1e4837..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/fetch-request/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via fetch-request using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/fetch-request/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/fetch-request/no-redirect/generic.http.html.headers
deleted file mode 100644
index 306a53536ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/fetch-request/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html
deleted file mode 100644
index b74b0d48002..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via fetch-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 306a53536ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html
deleted file mode 100644
index e18a7d6a716..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via iframe-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 306a53536ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/iframe-tag/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/iframe-tag/no-redirect/generic.http.html
deleted file mode 100644
index 792f0231e44..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/iframe-tag/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via iframe-tag using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/iframe-tag/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/iframe-tag/no-redirect/generic.http.html.headers
deleted file mode 100644
index 306a53536ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/iframe-tag/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html
deleted file mode 100644
index a3d13d7ef6b..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via iframe-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 306a53536ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html
deleted file mode 100644
index e4dc43e104e..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via img-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 306a53536ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/img-tag/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/img-tag/no-redirect/generic.http.html
deleted file mode 100644
index fcc9e44e29c..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/img-tag/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via img-tag using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/img-tag/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/img-tag/no-redirect/generic.http.html.headers
deleted file mode 100644
index 306a53536ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/img-tag/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html
deleted file mode 100644
index 41d15b0fcde..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via img-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 306a53536ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 8f54379c868..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via module-worker using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "module-worker",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 306a53536ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/module-worker/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/module-worker/no-redirect/generic.http.html
deleted file mode 100644
index fabac2224ef..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/module-worker/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via module-worker using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "module-worker",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/module-worker/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/module-worker/no-redirect/generic.http.html.headers
deleted file mode 100644
index 306a53536ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/module-worker/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 9635d1c76c6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via script-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 306a53536ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/script-tag/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/script-tag/no-redirect/generic.http.html
deleted file mode 100644
index b825d86ed65..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/script-tag/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via script-tag using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/script-tag/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/script-tag/no-redirect/generic.http.html.headers
deleted file mode 100644
index 306a53536ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/script-tag/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html
deleted file mode 100644
index a8231d341c6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via script-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 306a53536ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/generic.http.html
deleted file mode 100644
index ac410b09142..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via shared-worker using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "shared-worker",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 306a53536ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/shared-worker/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/shared-worker/no-redirect/generic.http.html
deleted file mode 100644
index 53d23827867..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/shared-worker/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via shared-worker using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "shared-worker",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/shared-worker/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/shared-worker/no-redirect/generic.http.html.headers
deleted file mode 100644
index 306a53536ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/shared-worker/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 35418f29644..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via worker-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "worker-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 306a53536ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/worker-request/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/worker-request/no-redirect/generic.http.html
deleted file mode 100644
index 4d62a43436b..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/worker-request/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via worker-request using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "worker-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/worker-request/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/worker-request/no-redirect/generic.http.html.headers
deleted file mode 100644
index 306a53536ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/worker-request/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html
deleted file mode 100644
index ae89a6a0880..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via xhr-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 306a53536ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/xhr-request/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/xhr-request/no-redirect/generic.http.html
deleted file mode 100644
index 06c3b88fb1c..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/xhr-request/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via xhr-request using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/xhr-request/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/xhr-request/no-redirect/generic.http.html.headers
deleted file mode 100644
index 306a53536ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/xhr-request/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html
deleted file mode 100644
index 237a5f0f491..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via xhr-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 306a53536ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html
deleted file mode 100644
index ec9ed5db268..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via fetch-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 306a53536ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/fetch-request/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/fetch-request/no-redirect/generic.http.html
deleted file mode 100644
index 545d5215b80..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/fetch-request/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via fetch-request using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/fetch-request/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/fetch-request/no-redirect/generic.http.html.headers
deleted file mode 100644
index 306a53536ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/fetch-request/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html
deleted file mode 100644
index 0a8b8a98c18..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via fetch-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 306a53536ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html
deleted file mode 100644
index a4efc8f4d6b..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via iframe-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 306a53536ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/generic.http.html
deleted file mode 100644
index 5ff897669a4..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via iframe-tag using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/generic.http.html.headers
deleted file mode 100644
index 306a53536ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html
deleted file mode 100644
index 51d8fd3ede2..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via iframe-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 306a53536ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html
deleted file mode 100644
index bf13e92fa48..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via img-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 306a53536ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/img-tag/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/img-tag/no-redirect/generic.http.html
deleted file mode 100644
index d1fddfb6a42..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/img-tag/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via img-tag using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/img-tag/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/img-tag/no-redirect/generic.http.html.headers
deleted file mode 100644
index 306a53536ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/img-tag/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html
deleted file mode 100644
index cbdc2336ada..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via img-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 306a53536ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 8563ebfd9fe..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via script-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 306a53536ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/script-tag/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/script-tag/no-redirect/generic.http.html
deleted file mode 100644
index 6365a8bcf02..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/script-tag/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via script-tag using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/script-tag/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/script-tag/no-redirect/generic.http.html.headers
deleted file mode 100644
index 306a53536ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/script-tag/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html
deleted file mode 100644
index 35002016c5a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via script-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 306a53536ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 0f0d047fffa..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via xhr-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 306a53536ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/xhr-request/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/xhr-request/no-redirect/generic.http.html
deleted file mode 100644
index 4c9cd6fdaa1..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/xhr-request/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via xhr-request using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/xhr-request/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/xhr-request/no-redirect/generic.http.html.headers
deleted file mode 100644
index 306a53536ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/xhr-request/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html
deleted file mode 100644
index d9787a4e6d5..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via xhr-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html.headers
deleted file mode 100644
index 306a53536ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html
deleted file mode 100644
index a150b8ea76d..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <meta name="referrer" content="origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via fetch-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/fetch-request/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/fetch-request/no-redirect/generic.http.html
deleted file mode 100644
index e1c0b2a5b5a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/fetch-request/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <meta name="referrer" content="origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via fetch-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html
deleted file mode 100644
index 8dc5fd5aa9a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <meta name="referrer" content="origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via fetch-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html
deleted file mode 100644
index f74e8d3cbd5..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <meta name="referrer" content="origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via iframe-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html
deleted file mode 100644
index 71d01012864..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <meta name="referrer" content="origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via iframe-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html
deleted file mode 100644
index c5e42caa8ba..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <meta name="referrer" content="origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via iframe-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html
deleted file mode 100644
index f9673638209..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <meta name="referrer" content="origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via script-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/script-tag/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/script-tag/no-redirect/generic.http.html
deleted file mode 100644
index d4306b79349..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/script-tag/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <meta name="referrer" content="origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via script-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html
deleted file mode 100644
index 0b0ff184b64..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <meta name="referrer" content="origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via script-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 414c8723ca1..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <meta name="referrer" content="origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via xhr-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/xhr-request/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/xhr-request/no-redirect/generic.http.html
deleted file mode 100644
index ba53dcf3508..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/xhr-request/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <meta name="referrer" content="origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via xhr-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html
deleted file mode 100644
index 0525b3cd2ee..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <meta name="referrer" content="origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via xhr-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 35b705119f7..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <meta name="referrer" content="origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via fetch-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/fetch-request/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/fetch-request/no-redirect/generic.http.html
deleted file mode 100644
index d5908e7ba78..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/fetch-request/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <meta name="referrer" content="origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via fetch-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html
deleted file mode 100644
index 3be90e5d4ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <meta name="referrer" content="origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via fetch-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html
deleted file mode 100644
index d64247c6447..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <meta name="referrer" content="origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via iframe-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html
deleted file mode 100644
index f9769b95f9f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <meta name="referrer" content="origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via iframe-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html
deleted file mode 100644
index 7c9b8c83221..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <meta name="referrer" content="origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via iframe-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 2385c83cab9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <meta name="referrer" content="origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via script-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/script-tag/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/script-tag/no-redirect/generic.http.html
deleted file mode 100644
index bfe81dde602..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/script-tag/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <meta name="referrer" content="origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via script-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html
deleted file mode 100644
index c4305ba0bc8..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <meta name="referrer" content="origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via script-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 7d89052f52f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <meta name="referrer" content="origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via xhr-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/xhr-request/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/xhr-request/no-redirect/generic.http.html
deleted file mode 100644
index 738ef6b1996..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/xhr-request/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <meta name="referrer" content="origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via xhr-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html
deleted file mode 100644
index f34d5494e7d..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <meta name="referrer" content="origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via xhr-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 3209281673b..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <meta name="referrer" content="origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via fetch-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/fetch-request/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/fetch-request/no-redirect/generic.http.html
deleted file mode 100644
index e5d16e24a55..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/fetch-request/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <meta name="referrer" content="origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via fetch-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html
deleted file mode 100644
index 8009f57b1ee..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <meta name="referrer" content="origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via fetch-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html
deleted file mode 100644
index b702eef57fc..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <meta name="referrer" content="origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via iframe-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/iframe-tag/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/iframe-tag/no-redirect/generic.http.html
deleted file mode 100644
index b97825de1e0..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/iframe-tag/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <meta name="referrer" content="origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via iframe-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html
deleted file mode 100644
index 5c73dd4d88d..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <meta name="referrer" content="origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via iframe-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/module-worker/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/module-worker/keep-origin-redirect/generic.http.html
deleted file mode 100644
index aa9af02fe1e..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/module-worker/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <meta name="referrer" content="origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via module-worker using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "module-worker",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/module-worker/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/module-worker/no-redirect/generic.http.html
deleted file mode 100644
index 43f41479755..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/module-worker/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <meta name="referrer" content="origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via module-worker using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "module-worker",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html
deleted file mode 100644
index cd10ed2b6b5..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <meta name="referrer" content="origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via script-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/script-tag/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/script-tag/no-redirect/generic.http.html
deleted file mode 100644
index a1538cc41be..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/script-tag/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <meta name="referrer" content="origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via script-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html
deleted file mode 100644
index 4fc2718a910..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <meta name="referrer" content="origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via script-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/shared-worker/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/shared-worker/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 2ffaea9826c..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/shared-worker/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <meta name="referrer" content="origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via shared-worker using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "shared-worker",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/shared-worker/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/shared-worker/no-redirect/generic.http.html
deleted file mode 100644
index c997e228e17..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/shared-worker/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <meta name="referrer" content="origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via shared-worker using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "shared-worker",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/worker-request/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/worker-request/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 2872d59fc51..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/worker-request/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <meta name="referrer" content="origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via worker-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "worker-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/worker-request/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/worker-request/no-redirect/generic.http.html
deleted file mode 100644
index dc7222d3732..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/worker-request/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <meta name="referrer" content="origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via worker-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "worker-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html
deleted file mode 100644
index a2c953d6e74..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <meta name="referrer" content="origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via xhr-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/xhr-request/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/xhr-request/no-redirect/generic.http.html
deleted file mode 100644
index 2bf98b82119..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/xhr-request/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <meta name="referrer" content="origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via xhr-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html
deleted file mode 100644
index 0af634a6d27..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <meta name="referrer" content="origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via xhr-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 57d8f47d4f2..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <meta name="referrer" content="origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via fetch-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-https/fetch-request/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-https/fetch-request/no-redirect/generic.http.html
deleted file mode 100644
index 47870a7628e..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-https/fetch-request/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <meta name="referrer" content="origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via fetch-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html
deleted file mode 100644
index 3d1253229e3..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <meta name="referrer" content="origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via fetch-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 8c0a1ec4eb7..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <meta name="referrer" content="origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via iframe-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/generic.http.html
deleted file mode 100644
index eaf45d6f7a5..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <meta name="referrer" content="origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via iframe-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html
deleted file mode 100644
index 9eaefdaf1ec..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <meta name="referrer" content="origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via iframe-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 413e8ad82a1..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <meta name="referrer" content="origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via script-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-https/script-tag/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-https/script-tag/no-redirect/generic.http.html
deleted file mode 100644
index 2832c088422..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-https/script-tag/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <meta name="referrer" content="origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via script-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html
deleted file mode 100644
index 78773bd5e71..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <meta name="referrer" content="origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via script-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 3cd75589c30..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <meta name="referrer" content="origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via xhr-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-https/xhr-request/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-https/xhr-request/no-redirect/generic.http.html
deleted file mode 100644
index cbccc42abda..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-https/xhr-request/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <meta name="referrer" content="origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via xhr-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html
deleted file mode 100644
index ccd15b3bbfc..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
- <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
- <meta name="referrer" content="origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via xhr-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/cross-origin.http.html
deleted file mode 100644
index cca4a0ceb6e..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via fetch-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/cross-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/cross-origin.http.html.headers
deleted file mode 100644
index 309da8091a9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/cross-origin.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/no-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/no-redirect/cross-origin.http.html
deleted file mode 100644
index 8bf793b5b86..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/no-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via fetch-request using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/no-redirect/cross-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/no-redirect/cross-origin.http.html.headers
deleted file mode 100644
index 309da8091a9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/no-redirect/cross-origin.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/cross-origin.http.html
deleted file mode 100644
index 7c0a9b9bc60..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via fetch-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/cross-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/cross-origin.http.html.headers
deleted file mode 100644
index 309da8091a9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/cross-origin.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-origin.http.html
deleted file mode 100644
index 9c2b85af9b3..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via iframe-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-origin.http.html.headers
deleted file mode 100644
index 309da8091a9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-origin.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/no-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/no-redirect/cross-origin.http.html
deleted file mode 100644
index 96bc005ebf9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/no-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via iframe-tag using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/no-redirect/cross-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/no-redirect/cross-origin.http.html.headers
deleted file mode 100644
index 309da8091a9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/no-redirect/cross-origin.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-origin.http.html
deleted file mode 100644
index 4e35615bf1b..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via iframe-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-origin.http.html.headers
deleted file mode 100644
index 309da8091a9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-origin.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/cross-origin.http.html
deleted file mode 100644
index b78a720df68..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via img-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/cross-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/cross-origin.http.html.headers
deleted file mode 100644
index 309da8091a9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/cross-origin.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/no-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/no-redirect/cross-origin.http.html
deleted file mode 100644
index 7d5905ba238..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/no-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via img-tag using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/no-redirect/cross-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/no-redirect/cross-origin.http.html.headers
deleted file mode 100644
index 309da8091a9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/no-redirect/cross-origin.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/cross-origin.http.html
deleted file mode 100644
index 5a8e1fd812c..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via img-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/cross-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/cross-origin.http.html.headers
deleted file mode 100644
index 309da8091a9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/cross-origin.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/cross-origin.http.html
deleted file mode 100644
index f4a53c631d5..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via script-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/cross-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/cross-origin.http.html.headers
deleted file mode 100644
index 309da8091a9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/cross-origin.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/no-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/no-redirect/cross-origin.http.html
deleted file mode 100644
index d6b14df4795..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/no-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via script-tag using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/no-redirect/cross-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/no-redirect/cross-origin.http.html.headers
deleted file mode 100644
index 309da8091a9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/no-redirect/cross-origin.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/cross-origin.http.html
deleted file mode 100644
index b5daa974365..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via script-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/cross-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/cross-origin.http.html.headers
deleted file mode 100644
index 309da8091a9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/cross-origin.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/cross-origin.http.html
deleted file mode 100644
index 7fdc05de8d6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via xhr-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/cross-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/cross-origin.http.html.headers
deleted file mode 100644
index 309da8091a9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/cross-origin.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/no-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/no-redirect/cross-origin.http.html
deleted file mode 100644
index c5b705bef4b..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/no-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via xhr-request using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/no-redirect/cross-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/no-redirect/cross-origin.http.html.headers
deleted file mode 100644
index 309da8091a9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/no-redirect/cross-origin.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/cross-origin.http.html
deleted file mode 100644
index 926ed948d51..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via xhr-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/cross-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/cross-origin.http.html.headers
deleted file mode 100644
index 309da8091a9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/cross-origin.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/cross-origin.http.html
deleted file mode 100644
index b1d5c24fdad..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via fetch-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/cross-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/cross-origin.http.html.headers
deleted file mode 100644
index 309da8091a9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/cross-origin.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/no-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/no-redirect/cross-origin.http.html
deleted file mode 100644
index 29efe5be1eb..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/no-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via fetch-request using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/no-redirect/cross-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/no-redirect/cross-origin.http.html.headers
deleted file mode 100644
index 309da8091a9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/no-redirect/cross-origin.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/cross-origin.http.html
deleted file mode 100644
index 79b406bb6ef..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via fetch-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/cross-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/cross-origin.http.html.headers
deleted file mode 100644
index 309da8091a9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/cross-origin.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/cross-origin.http.html
deleted file mode 100644
index 553334e038b..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via iframe-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/cross-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/cross-origin.http.html.headers
deleted file mode 100644
index 309da8091a9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/cross-origin.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/no-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/no-redirect/cross-origin.http.html
deleted file mode 100644
index c23a6cdf198..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/no-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via iframe-tag using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/no-redirect/cross-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/no-redirect/cross-origin.http.html.headers
deleted file mode 100644
index 309da8091a9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/no-redirect/cross-origin.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/cross-origin.http.html
deleted file mode 100644
index 7dbb28b150e..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via iframe-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/cross-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/cross-origin.http.html.headers
deleted file mode 100644
index 309da8091a9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/cross-origin.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/cross-origin.http.html
deleted file mode 100644
index 0f8c2d41b9a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via img-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/cross-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/cross-origin.http.html.headers
deleted file mode 100644
index 309da8091a9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/cross-origin.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/no-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/no-redirect/cross-origin.http.html
deleted file mode 100644
index 85236c6263d..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/no-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via img-tag using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/no-redirect/cross-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/no-redirect/cross-origin.http.html.headers
deleted file mode 100644
index 309da8091a9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/no-redirect/cross-origin.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/cross-origin.http.html
deleted file mode 100644
index 26767fab0b3..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via img-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/cross-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/cross-origin.http.html.headers
deleted file mode 100644
index 309da8091a9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/cross-origin.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/cross-origin.http.html
deleted file mode 100644
index 2c98ba5babf..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via script-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/cross-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/cross-origin.http.html.headers
deleted file mode 100644
index 309da8091a9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/cross-origin.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/no-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/no-redirect/cross-origin.http.html
deleted file mode 100644
index 3a4e85ec7e6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/no-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via script-tag using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/no-redirect/cross-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/no-redirect/cross-origin.http.html.headers
deleted file mode 100644
index 309da8091a9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/no-redirect/cross-origin.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/cross-origin.http.html
deleted file mode 100644
index 7b0b4552057..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via script-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/cross-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/cross-origin.http.html.headers
deleted file mode 100644
index 309da8091a9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/cross-origin.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/cross-origin.http.html
deleted file mode 100644
index 274f04abe69..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via xhr-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/cross-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/cross-origin.http.html.headers
deleted file mode 100644
index 309da8091a9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/cross-origin.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/no-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/no-redirect/cross-origin.http.html
deleted file mode 100644
index dc7dfebee06..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/no-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via xhr-request using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/no-redirect/cross-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/no-redirect/cross-origin.http.html.headers
deleted file mode 100644
index 309da8091a9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/no-redirect/cross-origin.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/cross-origin.http.html
deleted file mode 100644
index b2d25b69e30..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via xhr-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/cross-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/cross-origin.http.html.headers
deleted file mode 100644
index 309da8091a9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/cross-origin.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/same-origin-insecure.http.html
deleted file mode 100644
index 622f77bde2d..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via fetch-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/same-origin-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/same-origin-insecure.http.html.headers
deleted file mode 100644
index 309da8091a9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/same-origin-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/no-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/no-redirect/same-origin-insecure.http.html
deleted file mode 100644
index dab704a425d..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/no-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via fetch-request using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/no-redirect/same-origin-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/no-redirect/same-origin-insecure.http.html.headers
deleted file mode 100644
index 309da8091a9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/no-redirect/same-origin-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/same-origin-insecure.http.html
deleted file mode 100644
index 878d948ceb3..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via fetch-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/same-origin-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/same-origin-insecure.http.html.headers
deleted file mode 100644
index 309da8091a9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/same-origin-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/same-origin-insecure.http.html
deleted file mode 100644
index 603ecc55779..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via iframe-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/same-origin-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/same-origin-insecure.http.html.headers
deleted file mode 100644
index 309da8091a9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/same-origin-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/no-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/no-redirect/same-origin-insecure.http.html
deleted file mode 100644
index 43a132e6808..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/no-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via iframe-tag using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/no-redirect/same-origin-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/no-redirect/same-origin-insecure.http.html.headers
deleted file mode 100644
index 309da8091a9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/no-redirect/same-origin-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html
deleted file mode 100644
index 1bd76067b27..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via iframe-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html.headers
deleted file mode 100644
index 309da8091a9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/same-origin-insecure.http.html
deleted file mode 100644
index d00194b1437..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via img-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/same-origin-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/same-origin-insecure.http.html.headers
deleted file mode 100644
index 309da8091a9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/same-origin-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/no-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/no-redirect/same-origin-insecure.http.html
deleted file mode 100644
index 2daad670867..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/no-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via img-tag using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/no-redirect/same-origin-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/no-redirect/same-origin-insecure.http.html.headers
deleted file mode 100644
index 309da8091a9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/no-redirect/same-origin-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/same-origin-insecure.http.html
deleted file mode 100644
index 1cda061aa01..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via img-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/same-origin-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/same-origin-insecure.http.html.headers
deleted file mode 100644
index 309da8091a9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/same-origin-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/same-origin-insecure.http.html
deleted file mode 100644
index 735a4acbdf6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via module-worker using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "module-worker",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/same-origin-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/same-origin-insecure.http.html.headers
deleted file mode 100644
index 309da8091a9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/same-origin-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/module-worker/no-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/module-worker/no-redirect/same-origin-insecure.http.html
deleted file mode 100644
index 19e5416cb3f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/module-worker/no-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via module-worker using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "module-worker",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/module-worker/no-redirect/same-origin-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/module-worker/no-redirect/same-origin-insecure.http.html.headers
deleted file mode 100644
index 309da8091a9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/module-worker/no-redirect/same-origin-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/same-origin-insecure.http.html
deleted file mode 100644
index e45cbc673ae..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via script-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/same-origin-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/same-origin-insecure.http.html.headers
deleted file mode 100644
index 309da8091a9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/same-origin-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/no-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/no-redirect/same-origin-insecure.http.html
deleted file mode 100644
index 4539d076c49..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/no-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via script-tag using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/no-redirect/same-origin-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/no-redirect/same-origin-insecure.http.html.headers
deleted file mode 100644
index 309da8091a9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/no-redirect/same-origin-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/same-origin-insecure.http.html
deleted file mode 100644
index 7f3e435f11a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via script-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/same-origin-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/same-origin-insecure.http.html.headers
deleted file mode 100644
index 309da8091a9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/same-origin-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/same-origin-insecure.http.html
deleted file mode 100644
index 81607785f9a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via shared-worker using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "shared-worker",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/same-origin-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/same-origin-insecure.http.html.headers
deleted file mode 100644
index 309da8091a9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/same-origin-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/shared-worker/no-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/shared-worker/no-redirect/same-origin-insecure.http.html
deleted file mode 100644
index a8a6aa1d828..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/shared-worker/no-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via shared-worker using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "shared-worker",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/shared-worker/no-redirect/same-origin-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/shared-worker/no-redirect/same-origin-insecure.http.html.headers
deleted file mode 100644
index 309da8091a9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/shared-worker/no-redirect/same-origin-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/same-origin-insecure.http.html
deleted file mode 100644
index f1eba7aacdc..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via worker-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "worker-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/same-origin-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/same-origin-insecure.http.html.headers
deleted file mode 100644
index 309da8091a9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/same-origin-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/worker-request/no-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/worker-request/no-redirect/same-origin-insecure.http.html
deleted file mode 100644
index 7ab09331785..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/worker-request/no-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via worker-request using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "worker-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/worker-request/no-redirect/same-origin-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/worker-request/no-redirect/same-origin-insecure.http.html.headers
deleted file mode 100644
index 309da8091a9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/worker-request/no-redirect/same-origin-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/same-origin-insecure.http.html
deleted file mode 100644
index 29ba286e378..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via xhr-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/same-origin-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/same-origin-insecure.http.html.headers
deleted file mode 100644
index 309da8091a9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/same-origin-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/no-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/no-redirect/same-origin-insecure.http.html
deleted file mode 100644
index 0d1b267039a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/no-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via xhr-request using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/no-redirect/same-origin-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/no-redirect/same-origin-insecure.http.html.headers
deleted file mode 100644
index 309da8091a9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/no-redirect/same-origin-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/same-origin-insecure.http.html
deleted file mode 100644
index dd07624a999..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via xhr-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/same-origin-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/same-origin-insecure.http.html.headers
deleted file mode 100644
index 309da8091a9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/same-origin-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-insecure.http.html
deleted file mode 100644
index 38df795e3a5..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via fetch-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-insecure.http.html.headers
deleted file mode 100644
index 309da8091a9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html
deleted file mode 100644
index 525df39fd4b..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via iframe-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html.headers
deleted file mode 100644
index 309da8091a9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html
deleted file mode 100644
index a4533c649ae..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via img-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html.headers
deleted file mode 100644
index 309da8091a9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html
deleted file mode 100644
index 037bb3fee46..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via script-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html.headers
deleted file mode 100644
index 309da8091a9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-insecure.http.html
deleted file mode 100644
index 7671fa5c539..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via xhr-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-insecure.http.html.headers
deleted file mode 100644
index 309da8091a9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/fetch-request/keep-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/fetch-request/keep-origin-redirect/cross-origin.http.html
deleted file mode 100644
index 085a267a574..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/fetch-request/keep-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via fetch-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/fetch-request/no-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/fetch-request/no-redirect/cross-origin.http.html
deleted file mode 100644
index cc554724b30..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/fetch-request/no-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via fetch-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/fetch-request/swap-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/fetch-request/swap-origin-redirect/cross-origin.http.html
deleted file mode 100644
index 011ffcd01eb..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/fetch-request/swap-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via fetch-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-origin.http.html
deleted file mode 100644
index 3f7d38759e9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via iframe-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/iframe-tag/no-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/iframe-tag/no-redirect/cross-origin.http.html
deleted file mode 100644
index f66e36d7a9b..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/iframe-tag/no-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via iframe-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-origin.http.html
deleted file mode 100644
index e10c1066d64..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via iframe-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/cross-origin.http.html
deleted file mode 100644
index e50f65e16b9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via script-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/script-tag/no-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/script-tag/no-redirect/cross-origin.http.html
deleted file mode 100644
index 5b5dd12e596..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/script-tag/no-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via script-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/cross-origin.http.html
deleted file mode 100644
index ebc18c61cdc..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via script-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/xhr-request/keep-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/xhr-request/keep-origin-redirect/cross-origin.http.html
deleted file mode 100644
index 06becc108f4..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/xhr-request/keep-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via xhr-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/xhr-request/no-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/xhr-request/no-redirect/cross-origin.http.html
deleted file mode 100644
index 88a7cddb0b0..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/xhr-request/no-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via xhr-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/xhr-request/swap-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/xhr-request/swap-origin-redirect/cross-origin.http.html
deleted file mode 100644
index ebd68284221..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/xhr-request/swap-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via xhr-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/fetch-request/keep-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/fetch-request/keep-origin-redirect/cross-origin.http.html
deleted file mode 100644
index df69d477669..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/fetch-request/keep-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via fetch-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/fetch-request/no-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/fetch-request/no-redirect/cross-origin.http.html
deleted file mode 100644
index eda910d0922..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/fetch-request/no-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via fetch-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/fetch-request/swap-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/fetch-request/swap-origin-redirect/cross-origin.http.html
deleted file mode 100644
index 37370379123..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/fetch-request/swap-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via fetch-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/cross-origin.http.html
deleted file mode 100644
index 56e124b1470..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via iframe-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/iframe-tag/no-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/iframe-tag/no-redirect/cross-origin.http.html
deleted file mode 100644
index 2d1110639e0..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/iframe-tag/no-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via iframe-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/cross-origin.http.html
deleted file mode 100644
index 22fe64a0945..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via iframe-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/cross-origin.http.html
deleted file mode 100644
index f81dd12dc60..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via script-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/script-tag/no-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/script-tag/no-redirect/cross-origin.http.html
deleted file mode 100644
index 484d9ec036f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/script-tag/no-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via script-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/cross-origin.http.html
deleted file mode 100644
index e566233091f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via script-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/xhr-request/keep-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/xhr-request/keep-origin-redirect/cross-origin.http.html
deleted file mode 100644
index f68dac93582..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/xhr-request/keep-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via xhr-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/xhr-request/no-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/xhr-request/no-redirect/cross-origin.http.html
deleted file mode 100644
index 7ffc2824a8b..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/xhr-request/no-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via xhr-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/xhr-request/swap-origin-redirect/cross-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/xhr-request/swap-origin-redirect/cross-origin.http.html
deleted file mode 100644
index 0834f026a39..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/xhr-request/swap-origin-redirect/cross-origin.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via xhr-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/fetch-request/keep-origin-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/fetch-request/keep-origin-redirect/same-origin-insecure.http.html
deleted file mode 100644
index 51d538a7502..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/fetch-request/keep-origin-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via fetch-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/fetch-request/no-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/fetch-request/no-redirect/same-origin-insecure.http.html
deleted file mode 100644
index 09e9945924b..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/fetch-request/no-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via fetch-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/fetch-request/swap-origin-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/fetch-request/swap-origin-redirect/same-origin-insecure.http.html
deleted file mode 100644
index ebd39b1026f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/fetch-request/swap-origin-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via fetch-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/same-origin-insecure.http.html
deleted file mode 100644
index 3cefbeb1b7d..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via iframe-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/iframe-tag/no-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/iframe-tag/no-redirect/same-origin-insecure.http.html
deleted file mode 100644
index 1f883558c63..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/iframe-tag/no-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via iframe-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html
deleted file mode 100644
index d705e0ad324..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via iframe-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/module-worker/keep-origin-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/module-worker/keep-origin-redirect/same-origin-insecure.http.html
deleted file mode 100644
index 1dc4c4cd4d1..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/module-worker/keep-origin-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via module-worker using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "module-worker",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/module-worker/no-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/module-worker/no-redirect/same-origin-insecure.http.html
deleted file mode 100644
index 1c28100003e..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/module-worker/no-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via module-worker using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "module-worker",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/script-tag/keep-origin-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/script-tag/keep-origin-redirect/same-origin-insecure.http.html
deleted file mode 100644
index 8abb5198b86..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/script-tag/keep-origin-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via script-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/script-tag/no-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/script-tag/no-redirect/same-origin-insecure.http.html
deleted file mode 100644
index 9d4630b46c5..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/script-tag/no-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via script-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/script-tag/swap-origin-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/script-tag/swap-origin-redirect/same-origin-insecure.http.html
deleted file mode 100644
index 58e0f26e2f8..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/script-tag/swap-origin-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via script-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/shared-worker/keep-origin-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/shared-worker/keep-origin-redirect/same-origin-insecure.http.html
deleted file mode 100644
index f47b1f37046..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/shared-worker/keep-origin-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via shared-worker using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "shared-worker",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/shared-worker/no-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/shared-worker/no-redirect/same-origin-insecure.http.html
deleted file mode 100644
index b45744a94ea..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/shared-worker/no-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via shared-worker using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "shared-worker",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/worker-request/keep-origin-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/worker-request/keep-origin-redirect/same-origin-insecure.http.html
deleted file mode 100644
index d2061267c24..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/worker-request/keep-origin-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via worker-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "worker-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/worker-request/no-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/worker-request/no-redirect/same-origin-insecure.http.html
deleted file mode 100644
index 5f35a68ef06..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/worker-request/no-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via worker-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "worker-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/xhr-request/keep-origin-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/xhr-request/keep-origin-redirect/same-origin-insecure.http.html
deleted file mode 100644
index e9787edaecc..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/xhr-request/keep-origin-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via xhr-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/xhr-request/no-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/xhr-request/no-redirect/same-origin-insecure.http.html
deleted file mode 100644
index e00a911d55a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/xhr-request/no-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via xhr-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/xhr-request/swap-origin-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/xhr-request/swap-origin-redirect/same-origin-insecure.http.html
deleted file mode 100644
index 699e73a837f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/xhr-request/swap-origin-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via xhr-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-insecure.http.html
deleted file mode 100644
index fd369ed2ec5..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via fetch-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html
deleted file mode 100644
index 426a91f7370..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via iframe-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html
deleted file mode 100644
index 18250c8c3d9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via script-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-insecure.http.html
deleted file mode 100644
index 019debb40a5..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/same-origin/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via xhr-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/spec.src.json b/tests/wpt/web-platform-tests/referrer-policy/spec.src.json
index f69c289526a..ab02dcc1b16 100644
--- a/tests/wpt/web-platform-tests/referrer-policy/spec.src.json
+++ b/tests/wpt/web-platform-tests/referrer-policy/spec.src.json
@@ -10,6 +10,7 @@
"name": "insecure-protocol",
"expansion": "default",
"source_scheme": "http",
+ "source_context_list": "*",
"delivery_type": "*",
"delivery_value": null,
"redirection": "*",
@@ -24,6 +25,7 @@
"name": "upgrade-protocol",
"expansion": "default",
"source_scheme": "http",
+ "source_context_list": "*",
"delivery_type": "*",
"delivery_value": null,
"redirection": "*",
@@ -38,6 +40,7 @@
"name": "downgrade-protocol",
"expansion": "default",
"source_scheme": "https",
+ "source_context_list": "*",
"delivery_type": "*",
"delivery_value": null,
"redirection": "*",
@@ -52,6 +55,7 @@
"name": "secure-protocol",
"expansion": "default",
"source_scheme": "https",
+ "source_context_list": "*",
"delivery_type": "*",
"delivery_value": null,
"redirection": "*",
@@ -74,6 +78,7 @@
"name": "generic",
"expansion": "default",
"source_scheme": "*",
+ "source_context_list": "*",
"delivery_type": "*",
"delivery_value": "no-referrer",
"redirection": "*",
@@ -93,6 +98,7 @@
"name": "insecure-protocol",
"expansion": "default",
"source_scheme": "http",
+ "source_context_list": "*",
"delivery_type": "*",
"delivery_value": "no-referrer-when-downgrade",
"redirection": "*",
@@ -107,6 +113,7 @@
"name": "upgrade-protocol",
"expansion": "default",
"source_scheme": "http",
+ "source_context_list": "*",
"delivery_type": "*",
"delivery_value": "no-referrer-when-downgrade",
"redirection": "*",
@@ -121,6 +128,7 @@
"name": "downgrade-protocol",
"expansion": "default",
"source_scheme": "https",
+ "source_context_list": "*",
"delivery_type": "*",
"delivery_value": "no-referrer-when-downgrade",
"redirection": "*",
@@ -135,6 +143,7 @@
"name": "secure-protocol",
"expansion": "default",
"source_scheme": "https",
+ "source_context_list": "*",
"delivery_type": "*",
"delivery_value": "no-referrer-when-downgrade",
"redirection": "*",
@@ -157,6 +166,7 @@
"name": "generic",
"expansion": "default",
"source_scheme": "*",
+ "source_context_list": "*",
"delivery_type": "*",
"delivery_value": "origin",
"redirection": "*",
@@ -176,6 +186,7 @@
"name": "same-origin-insecure",
"expansion": "default",
"source_scheme": "http",
+ "source_context_list": "*",
"delivery_type": "*",
"delivery_value": "same-origin",
"redirection": "*",
@@ -187,6 +198,7 @@
"name": "same-origin-secure-default",
"expansion": "default",
"source_scheme": "https",
+ "source_context_list": "*",
"delivery_type": "*",
"delivery_value": "same-origin",
"redirection": "*",
@@ -198,6 +210,7 @@
"name": "same-origin-insecure",
"expansion": "override",
"source_scheme": "*",
+ "source_context_list": "*",
"delivery_type": "*",
"delivery_value": "same-origin",
"redirection": "swap-origin",
@@ -212,6 +225,7 @@
"name": "cross-origin",
"expansion": "default",
"source_scheme": "*",
+ "source_context_list": "*",
"delivery_type": "*",
"delivery_value": "same-origin",
"redirection": "*",
@@ -234,6 +248,7 @@
"name": "same-origin-insecure",
"expansion": "default",
"source_scheme": "http",
+ "source_context_list": "*",
"delivery_type": "*",
"delivery_value": "origin-when-cross-origin",
"redirection": "*",
@@ -245,6 +260,7 @@
"name": "same-origin-secure-default",
"expansion": "default",
"source_scheme": "https",
+ "source_context_list": "*",
"delivery_type": "*",
"delivery_value": "origin-when-cross-origin",
"redirection": "*",
@@ -256,6 +272,7 @@
"name": "same-origin-upgrade",
"expansion": "default",
"source_scheme": "http",
+ "source_context_list": "*",
"delivery_type": "*",
"delivery_value": "origin-when-cross-origin",
"redirection": "*",
@@ -267,6 +284,7 @@
"name": "same-origin-downgrade",
"expansion": "default",
"source_scheme": "https",
+ "source_context_list": "*",
"delivery_type": "*",
"delivery_value": "origin-when-cross-origin",
"redirection": "*",
@@ -278,6 +296,7 @@
"name": "same-origin-insecure",
"expansion": "override",
"source_scheme": "*",
+ "source_context_list": "*",
"delivery_type": "*",
"delivery_value": "origin-when-cross-origin",
"redirection": "swap-origin",
@@ -292,6 +311,7 @@
"name": "cross-origin",
"expansion": "default",
"source_scheme": "*",
+ "source_context_list": "*",
"delivery_type": "*",
"delivery_value": "origin-when-cross-origin",
"redirection": "*",
@@ -314,6 +334,7 @@
"name": "insecure-protocol",
"expansion": "default",
"source_scheme": "http",
+ "source_context_list": "*",
"delivery_type": "*",
"delivery_value": "strict-origin",
"redirection": "*",
@@ -328,6 +349,7 @@
"name": "upgrade-protocol",
"expansion": "default",
"source_scheme": "http",
+ "source_context_list": "*",
"delivery_type": "*",
"delivery_value": "strict-origin",
"redirection": "*",
@@ -342,6 +364,7 @@
"name": "downgrade-protocol",
"expansion": "default",
"source_scheme": "https",
+ "source_context_list": "*",
"delivery_type": "*",
"delivery_value": "strict-origin",
"redirection": "*",
@@ -356,6 +379,7 @@
"name": "secure-protocol",
"expansion": "default",
"source_scheme": "https",
+ "source_context_list": "*",
"delivery_type": "*",
"delivery_value": "strict-origin",
"redirection": "*",
@@ -378,6 +402,7 @@
"name": "same-insecure",
"expansion": "default",
"source_scheme": "http",
+ "source_context_list": "*",
"delivery_type": "*",
"delivery_value": "strict-origin-when-cross-origin",
"redirection": "*",
@@ -389,6 +414,7 @@
"name": "same-insecure",
"expansion": "override",
"source_scheme": "http",
+ "source_context_list": "*",
"delivery_type": "*",
"delivery_value": "strict-origin-when-cross-origin",
"redirection": "swap-origin",
@@ -400,6 +426,7 @@
"name": "cross-insecure",
"expansion": "default",
"source_scheme": "http",
+ "source_context_list": "*",
"delivery_type": "*",
"delivery_value": "strict-origin-when-cross-origin",
"redirection": "*",
@@ -411,6 +438,7 @@
"name": "upgrade-protocol",
"expansion": "default",
"source_scheme": "http",
+ "source_context_list": "*",
"delivery_type": "*",
"delivery_value": "strict-origin-when-cross-origin",
"redirection": "*",
@@ -425,6 +453,7 @@
"name": "downgrade-protocol",
"expansion": "default",
"source_scheme": "https",
+ "source_context_list": "*",
"delivery_type": "*",
"delivery_value": "strict-origin-when-cross-origin",
"redirection": "*",
@@ -439,6 +468,7 @@
"name": "same-secure",
"expansion": "default",
"source_scheme": "https",
+ "source_context_list": "*",
"delivery_type": "*",
"delivery_value": "strict-origin-when-cross-origin",
"redirection": "*",
@@ -450,6 +480,7 @@
"name": "same-secure",
"expansion": "override",
"source_scheme": "https",
+ "source_context_list": "*",
"delivery_type": "*",
"delivery_value": "strict-origin-when-cross-origin",
"redirection": "swap-origin",
@@ -461,6 +492,7 @@
"name": "cross-secure",
"expansion": "default",
"source_scheme": "https",
+ "source_context_list": "*",
"delivery_type": "*",
"delivery_value": "strict-origin-when-cross-origin",
"redirection": "*",
@@ -480,6 +512,7 @@
"name": "generic",
"expansion": "default",
"source_scheme": "*",
+ "source_context_list": "*",
"delivery_type": "*",
"delivery_value": "unsafe-url",
"redirection": "*",
@@ -496,6 +529,7 @@
"name": "cross-origin-workers",
"expansion": "*",
"source_scheme": "*",
+ "source_context_list": "*",
"redirection": "*",
"delivery_type": "*",
"delivery_value": "*",
@@ -504,9 +538,9 @@
"cross-https"
],
"subresource": [
- "worker-request",
- "module-worker",
- "shared-worker"
+ "worker-classic",
+ "worker-module",
+ "sharedworker-classic"
],
"expectation": "*"
},
@@ -514,6 +548,7 @@
"name": "upgraded-protocol-workers",
"expansion": "*",
"source_scheme": "http",
+ "source_context_list": "*",
"delivery_type": "*",
"delivery_value": "*",
"redirection": "*",
@@ -522,9 +557,9 @@
"cross-https"
],
"subresource": [
- "worker-request",
- "module-worker",
- "shared-worker"
+ "worker-classic",
+ "worker-module",
+ "sharedworker-classic"
],
"expectation": "*"
},
@@ -532,6 +567,7 @@
"name": "mixed-content-insecure-subresources",
"expansion": "*",
"source_scheme": "https",
+ "source_context_list": "*",
"delivery_type": "*",
"delivery_value": "*",
"redirection": "*",
@@ -546,6 +582,7 @@
"name": "area-tag",
"expansion": "*",
"source_scheme": "*",
+ "source_context_list": "*",
"delivery_type": "*",
"delivery_value": "*",
"redirection": "*",
@@ -557,14 +594,15 @@
"name": "worker-requests-with-swap-origin-redirect",
"expansion": "*",
"source_scheme": "*",
+ "source_context_list": "*",
"delivery_type": "*",
"delivery_value": "*",
"redirection": "swap-origin",
"origin": "*",
"subresource": [
- "worker-request",
- "module-worker",
- "shared-worker"
+ "worker-classic",
+ "worker-module",
+ "sharedworker-classic"
],
"expectation": "*"
},
@@ -572,6 +610,7 @@
"name": "overhead-for-redirection",
"expansion": "*",
"source_scheme": "*",
+ "source_context_list": "*",
"delivery_type": "*",
"delivery_value": "*",
"redirection": [
@@ -589,6 +628,7 @@
"name": "source-https-unsupported-by-web-platform-tests-runners",
"expansion": "*",
"source_scheme": "https",
+ "source_context_list": "*",
"delivery_type": "*",
"delivery_value": "*",
"redirection": "*",
@@ -600,6 +640,7 @@
"name": "<link rel=noreferrer>'s delivery_value should be no-referrer",
"expansion": "*",
"source_scheme": "*",
+ "source_context_list": "*",
"delivery_type": "rel-noref",
"delivery_value": [
null,
@@ -617,6 +658,226 @@
"expectation": "*"
}
],
+ "source_context_schema": {
+ "supported_delivery_type": {
+ "top": [
+ "meta",
+ "http-rp"
+ ],
+ "iframe": [
+ "meta",
+ "http-rp"
+ ],
+ "srcdoc": [
+ "meta"
+ ],
+ "worker-classic": [
+ "http-rp"
+ ],
+ "worker-module": [
+ "http-rp"
+ ],
+ "worker-classic-data": [],
+ "worker-module-data": []
+ },
+ "supported_subresource": {
+ "top": "*",
+ "iframe": "*",
+ "srcdoc": "*",
+ "worker-classic": [
+ "xhr",
+ "fetch",
+ "worker-classic",
+ "worker-module"
+ ],
+ "worker-module": [
+ "xhr",
+ "fetch",
+ "worker-classic",
+ "worker-module"
+ ],
+ "worker-classic-data": [
+ "xhr",
+ "fetch"
+ ],
+ "worker-module-data": [
+ "xhr",
+ "fetch"
+ ]
+ }
+ },
+ "subresource_schema": {
+ "supported_delivery_type": {
+ "iframe-tag": [
+ "attr"
+ ],
+ "img-tag": [
+ "attr"
+ ],
+ "script-tag": [
+ "attr"
+ ],
+ "a-tag": [
+ "attr",
+ "rel-noref"
+ ],
+ "area-tag": [
+ "attr"
+ ],
+ "xhr": [],
+ "fetch": [],
+ "worker-module": [],
+ "sharedworker-classic": [],
+ "worker-classic": []
+ }
+ },
+ "source_context_list_schema": {
+ "top": {
+ "description": "Policy set by the top-level Document",
+ "sourceContextList": [
+ {
+ "sourceContextType": "top",
+ "policyDeliveries": [
+ "policy"
+ ]
+ }
+ ],
+ "subresourcePolicyDeliveries": []
+ },
+ "req": {
+ "description": "Subresource request's policy should override Document's policy",
+ "sourceContextList": [
+ {
+ "sourceContextType": "top",
+ "policyDeliveries": [
+ "anotherPolicy"
+ ]
+ }
+ ],
+ "subresourcePolicyDeliveries": [
+ "nonNullPolicy"
+ ]
+ },
+ "srcdoc-inherit": {
+ "description": "srcdoc iframe should inherit parent Document's policy",
+ "sourceContextList": [
+ {
+ "sourceContextType": "top",
+ "policyDeliveries": [
+ "policy"
+ ]
+ },
+ {
+ "sourceContextType": "srcdoc"
+ }
+ ],
+ "subresourcePolicyDeliveries": []
+ },
+ "srcdoc": {
+ "description": "srcdoc iframe's policy should override parent Document's policy",
+ "sourceContextList": [
+ {
+ "sourceContextType": "top",
+ "policyDeliveries": [
+ "anotherPolicy"
+ ]
+ },
+ {
+ "sourceContextType": "srcdoc",
+ "policyDeliveries": [
+ "nonNullPolicy"
+ ]
+ }
+ ],
+ "subresourcePolicyDeliveries": []
+ },
+ "iframe": {
+ "description": "external iframe's policy should override parent Document's policy",
+ "sourceContextList": [
+ {
+ "sourceContextType": "top",
+ "policyDeliveries": [
+ "anotherPolicy"
+ ]
+ },
+ {
+ "sourceContextType": "iframe",
+ "policyDeliveries": [
+ "policy"
+ ]
+ }
+ ],
+ "subresourcePolicyDeliveries": []
+ },
+ "worker-classic": {
+ "sourceContextList": [
+ {
+ "sourceContextType": "top",
+ "policyDeliveries": [
+ "anotherPolicy"
+ ]
+ },
+ {
+ "sourceContextType": "worker-classic",
+ "policyDeliveries": [
+ "policy"
+ ]
+ }
+ ],
+ "subresourcePolicyDeliveries": []
+ },
+ "worker-classic-data": {
+ "sourceContextList": [
+ {
+ "sourceContextType": "top",
+ "policyDeliveries": [
+ "anotherPolicy"
+ ]
+ },
+ {
+ "sourceContextType": "worker-classic-data",
+ "policyDeliveries": [
+ "policy"
+ ]
+ }
+ ],
+ "subresourcePolicyDeliveries": []
+ },
+ "worker-module": {
+ "sourceContextList": [
+ {
+ "sourceContextType": "top",
+ "policyDeliveries": [
+ "anotherPolicy"
+ ]
+ },
+ {
+ "sourceContextType": "worker-module",
+ "policyDeliveries": [
+ "policy"
+ ]
+ }
+ ],
+ "subresourcePolicyDeliveries": []
+ },
+ "worker-module-data": {
+ "sourceContextList": [
+ {
+ "sourceContextType": "top",
+ "policyDeliveries": [
+ "anotherPolicy"
+ ]
+ },
+ {
+ "sourceContextType": "worker-module-data",
+ "policyDeliveries": [
+ "policy"
+ ]
+ }
+ ],
+ "subresourcePolicyDeliveries": []
+ }
+ },
"test_expansion_schema": {
"expansion": [
"default",
@@ -645,6 +906,17 @@
"cross-http",
"cross-https"
],
+ "source_context_list": [
+ "top",
+ "req",
+ "srcdoc-inherit",
+ "srcdoc",
+ "iframe",
+ "worker-classic",
+ "worker-classic-data",
+ "worker-module",
+ "worker-module-data"
+ ],
"source_scheme": [
"http",
"https"
@@ -660,11 +932,11 @@
"script-tag",
"a-tag",
"area-tag",
- "xhr-request",
- "worker-request",
- "module-worker",
- "shared-worker",
- "fetch-request"
+ "xhr",
+ "worker-classic",
+ "worker-module",
+ "sharedworker-classic",
+ "fetch"
],
"expectation": [
"omitted",
diff --git a/tests/wpt/web-platform-tests/referrer-policy/spec_json.js b/tests/wpt/web-platform-tests/referrer-policy/spec_json.js
index 346a6218f9e..1b507dbcf14 100644
--- a/tests/wpt/web-platform-tests/referrer-policy/spec_json.js
+++ b/tests/wpt/web-platform-tests/referrer-policy/spec_json.js
@@ -1 +1 @@
-var SPEC_JSON = {"test_expansion_schema": {"origin": ["same-origin", "cross-origin"], "subresource": ["iframe-tag", "img-tag", "script-tag", "a-tag", "area-tag", "xhr-request", "worker-request", "module-worker", "shared-worker", "fetch-request"], "target_protocol": ["http", "https"], "expansion": ["default", "override"], "delivery_method": ["http-rp", "meta-referrer", "attr-referrer", "rel-noreferrer"], "redirection": ["no-redirect", "keep-origin-redirect", "swap-origin-redirect"], "referrer_url": ["omitted", "origin", "stripped-referrer"], "source_protocol": ["http", "https"]}, "specification": [{"specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policies", "referrer_policy": null, "title": "Referrer Policy is not explicitly defined", "test_expansion": [{"origin": "*", "name": "insecure-protocol", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "http", "subresource": "*"}, {"origin": "*", "name": "upgrade-protocol", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "http", "subresource": "*"}, {"origin": "*", "name": "downgrade-protocol", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "omitted", "source_protocol": "https", "subresource": "*"}, {"origin": "*", "name": "secure-protocol", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "https", "subresource": "*"}], "name": "unset-referrer-policy", "description": "Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."}, {"specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer", "referrer_policy": "no-referrer", "title": "Referrer Policy is set to 'no-referrer'", "test_expansion": [{"origin": "*", "name": "generic", "target_protocol": "*", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "omitted", "source_protocol": "*", "subresource": "*"}], "name": "no-referrer", "description": "Check that sub-resource never gets the referrer URL."}, {"specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade", "referrer_policy": "no-referrer-when-downgrade", "title": "Referrer Policy is set to 'no-referrer-when-downgrade'", "test_expansion": [{"origin": "*", "name": "insecure-protocol", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "http", "subresource": "*"}, {"origin": "*", "name": "upgrade-protocol", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "http", "subresource": "*"}, {"origin": "*", "name": "downgrade-protocol", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "omitted", "source_protocol": "https", "subresource": "*"}, {"origin": "*", "name": "secure-protocol", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "https", "subresource": "*"}], "name": "no-referrer-when-downgrade", "description": "Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."}, {"specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin", "referrer_policy": "origin", "title": "Referrer Policy is set to 'origin'", "test_expansion": [{"origin": "*", "name": "generic", "target_protocol": "*", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "origin", "source_protocol": "*", "subresource": "*"}], "name": "origin", "description": "Check that all subresources in all casses get only the origin portion of the referrer URL."}, {"specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin", "referrer_policy": "same-origin", "title": "Referrer Policy is set to 'same-origin'", "test_expansion": [{"origin": "same-origin", "name": "same-origin-insecure", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "http", "subresource": "*"}, {"origin": "same-origin", "name": "same-origin-secure-default", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "https", "subresource": "*"}, {"origin": "same-origin", "name": "same-origin-insecure", "target_protocol": "*", "expansion": "override", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "swap-origin-redirect", "referrer_url": "omitted", "source_protocol": "*", "subresource": "*"}, {"origin": "cross-origin", "name": "cross-origin", "target_protocol": "*", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "omitted", "source_protocol": "*", "subresource": "*"}], "name": "same-origin", "description": "Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."}, {"specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin", "referrer_policy": "origin-when-cross-origin", "title": "Referrer Policy is set to 'origin-when-cross-origin'", "test_expansion": [{"origin": "same-origin", "name": "same-origin-insecure", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "http", "subresource": "*"}, {"origin": "same-origin", "name": "same-origin-secure-default", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "https", "subresource": "*"}, {"origin": "same-origin", "name": "same-origin-upgrade", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "origin", "source_protocol": "http", "subresource": "*"}, {"origin": "same-origin", "name": "same-origin-downgrade", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "origin", "source_protocol": "https", "subresource": "*"}, {"origin": "same-origin", "name": "same-origin-insecure", "target_protocol": "*", "expansion": "override", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "swap-origin-redirect", "referrer_url": "origin", "source_protocol": "*", "subresource": "*"}, {"origin": "cross-origin", "name": "cross-origin", "target_protocol": "*", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "origin", "source_protocol": "*", "subresource": "*"}], "name": "origin-when-cross-origin", "description": "Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."}, {"specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin", "referrer_policy": "strict-origin", "title": "Referrer Policy is set to 'strict-origin'", "test_expansion": [{"origin": "*", "name": "insecure-protocol", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "origin", "source_protocol": "http", "subresource": "*"}, {"origin": "*", "name": "upgrade-protocol", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "origin", "source_protocol": "http", "subresource": "*"}, {"origin": "*", "name": "downgrade-protocol", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "omitted", "source_protocol": "https", "subresource": "*"}, {"origin": "*", "name": "secure-protocol", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "origin", "source_protocol": "https", "subresource": "*"}], "name": "strict-origin", "description": "Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."}, {"specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin", "referrer_policy": "strict-origin-when-cross-origin", "title": "Referrer Policy is set to 'strict-origin-when-cross-origin'", "test_expansion": [{"origin": "same-origin", "name": "same-insecure", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "http", "subresource": "*"}, {"origin": "same-origin", "name": "same-insecure", "target_protocol": "http", "expansion": "override", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "swap-origin-redirect", "referrer_url": "origin", "source_protocol": "http", "subresource": "*"}, {"origin": "cross-origin", "name": "cross-insecure", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "origin", "source_protocol": "http", "subresource": "*"}, {"origin": "*", "name": "upgrade-protocol", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "origin", "source_protocol": "http", "subresource": "*"}, {"origin": "*", "name": "downgrade-protocol", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "omitted", "source_protocol": "https", "subresource": "*"}, {"origin": "same-origin", "name": "same-secure", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "https", "subresource": "*"}, {"origin": "same-origin", "name": "same-secure", "target_protocol": "https", "expansion": "override", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "swap-origin-redirect", "referrer_url": "origin", "source_protocol": "https", "subresource": "*"}, {"origin": "cross-origin", "name": "cross-secure", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "origin", "source_protocol": "https", "subresource": "*"}], "name": "strict-origin-when-cross-origin", "description": "Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."}, {"specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url", "referrer_policy": "unsafe-url", "title": "Referrer Policy is set to 'unsafe-url'", "test_expansion": [{"origin": "*", "name": "generic", "target_protocol": "*", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "*", "subresource": "*"}], "name": "unsafe-url", "description": "Check that all sub-resources get the stripped referrer URL."}], "referrer_policy_schema": [null, "no-referrer", "no-referrer-when-downgrade", "same-origin", "origin", "origin-when-cross-origin", "strict-origin", "strict-origin-when-cross-origin", "unsafe-url"], "excluded_tests": [{"origin": "cross-origin", "name": "cross-origin-workers", "target_protocol": "*", "expansion": "*", "delivery_method": "*", "redirection": "*", "referrer_url": "*", "source_protocol": "*", "subresource": ["worker-request", "module-worker", "shared-worker"]}, {"origin": "*", "name": "upgraded-protocol-workers", "target_protocol": "https", "expansion": "*", "delivery_method": "*", "redirection": "*", "referrer_url": "*", "source_protocol": "http", "subresource": ["worker-request", "module-worker", "shared-worker"]}, {"origin": "*", "name": "mixed-content-insecure-subresources", "target_protocol": "http", "expansion": "*", "delivery_method": "*", "redirection": "*", "referrer_url": "*", "source_protocol": "https", "subresource": "*"}, {"origin": "*", "name": "elements-not-supporting-attr-referrer", "target_protocol": "*", "expansion": "*", "delivery_method": ["attr-referrer"], "redirection": "*", "referrer_url": "*", "source_protocol": "*", "subresource": ["xhr-request", "worker-request", "module-worker", "shared-worker", "fetch-request"]}, {"origin": "*", "name": "elements-not-supporting-rel-noreferrer", "target_protocol": "*", "expansion": "*", "delivery_method": ["rel-noreferrer"], "redirection": "*", "referrer_url": "*", "source_protocol": "*", "subresource": ["iframe-tag", "img-tag", "script-tag", "xhr-request", "worker-request", "module-worker", "shared-worker", "fetch-request", "area-tag"]}, {"origin": "*", "name": "area-tag", "target_protocol": "*", "expansion": "*", "delivery_method": "*", "redirection": "*", "referrer_url": "*", "source_protocol": "*", "subresource": "area-tag"}, {"origin": "*", "name": "worker-requests-with-swap-origin-redirect", "target_protocol": "*", "expansion": "*", "delivery_method": "*", "redirection": "swap-origin-redirect", "referrer_url": "*", "source_protocol": "*", "subresource": ["worker-request", "module-worker", "shared-worker"]}, {"origin": "*", "name": "overhead-for-redirection", "target_protocol": "*", "expansion": "*", "delivery_method": "*", "redirection": ["keep-origin-redirect", "swap-origin-redirect"], "referrer_url": "*", "source_protocol": "*", "subresource": ["a-tag", "area-tag"]}, {"origin": "*", "name": "source-https-unsupported-by-web-platform-tests-runners", "target_protocol": "*", "expansion": "*", "delivery_method": "*", "redirection": "*", "referrer_url": "*", "source_protocol": "https", "subresource": "*"}]};
+var SPEC_JSON = {"subresource_schema": {"supported_delivery_type": {"img-tag": ["attr"], "sharedworker-classic": [], "xhr": [], "a-tag": ["attr", "rel-noref"], "area-tag": ["attr"], "iframe-tag": ["attr"], "worker-module": [], "script-tag": ["attr"], "fetch": [], "worker-classic": []}}, "excluded_tests": [{"delivery_value": "*", "origin": ["cross-http", "cross-https"], "delivery_type": "*", "name": "cross-origin-workers", "expectation": "*", "expansion": "*", "redirection": "*", "source_context_list": "*", "source_scheme": "*", "subresource": ["worker-classic", "worker-module", "sharedworker-classic"]}, {"delivery_value": "*", "origin": ["same-https", "cross-https"], "delivery_type": "*", "name": "upgraded-protocol-workers", "expectation": "*", "expansion": "*", "redirection": "*", "source_context_list": "*", "source_scheme": "http", "subresource": ["worker-classic", "worker-module", "sharedworker-classic"]}, {"delivery_value": "*", "origin": ["same-http", "cross-http"], "delivery_type": "*", "name": "mixed-content-insecure-subresources", "expectation": "*", "expansion": "*", "redirection": "*", "source_context_list": "*", "source_scheme": "https", "subresource": "*"}, {"delivery_value": "*", "origin": "*", "delivery_type": "*", "name": "area-tag", "expectation": "*", "expansion": "*", "redirection": "*", "source_context_list": "*", "source_scheme": "*", "subresource": "area-tag"}, {"delivery_value": "*", "origin": "*", "delivery_type": "*", "name": "worker-requests-with-swap-origin-redirect", "expectation": "*", "expansion": "*", "redirection": "swap-origin", "source_context_list": "*", "source_scheme": "*", "subresource": ["worker-classic", "worker-module", "sharedworker-classic"]}, {"delivery_value": "*", "origin": "*", "delivery_type": "*", "name": "overhead-for-redirection", "expectation": "*", "expansion": "*", "redirection": ["keep-origin", "swap-origin"], "source_context_list": "*", "source_scheme": "*", "subresource": ["a-tag", "area-tag"]}, {"delivery_value": "*", "origin": "*", "delivery_type": "*", "name": "source-https-unsupported-by-web-platform-tests-runners", "expectation": "*", "expansion": "*", "redirection": "*", "source_context_list": "*", "source_scheme": "https", "subresource": "*"}, {"delivery_value": [null, "no-referrer-when-downgrade", "same-origin", "origin", "origin-when-cross-origin", "strict-origin", "strict-origin-when-cross-origin", "unsafe-url"], "origin": "*", "delivery_type": "rel-noref", "name": "<link rel=noreferrer>'s delivery_value should be no-referrer", "expectation": "*", "expansion": "*", "redirection": "*", "source_context_list": "*", "source_scheme": "*", "subresource": "*"}], "specification": [{"test_expansion": [{"delivery_value": null, "origin": ["same-http", "cross-http"], "delivery_type": "*", "name": "insecure-protocol", "expectation": "stripped-referrer", "expansion": "default", "redirection": "*", "source_context_list": "*", "source_scheme": "http", "subresource": "*"}, {"delivery_value": null, "origin": ["same-https", "cross-https"], "delivery_type": "*", "name": "upgrade-protocol", "expectation": "stripped-referrer", "expansion": "default", "redirection": "*", "source_context_list": "*", "source_scheme": "http", "subresource": "*"}, {"delivery_value": null, "origin": ["same-http", "cross-http"], "delivery_type": "*", "name": "downgrade-protocol", "expectation": "omitted", "expansion": "default", "redirection": "*", "source_context_list": "*", "source_scheme": "https", "subresource": "*"}, {"delivery_value": null, "origin": ["same-https", "cross-https"], "delivery_type": "*", "name": "secure-protocol", "expectation": "stripped-referrer", "expansion": "default", "redirection": "*", "source_context_list": "*", "source_scheme": "https", "subresource": "*"}], "description": "Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.", "specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policies", "name": "unset-referrer-policy", "title": "Referrer Policy is not explicitly defined"}, {"test_expansion": [{"delivery_value": "no-referrer", "origin": "*", "delivery_type": "*", "name": "generic", "expectation": "omitted", "expansion": "default", "redirection": "*", "source_context_list": "*", "source_scheme": "*", "subresource": "*"}], "description": "Check that sub-resource never gets the referrer URL.", "specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer", "name": "no-referrer", "title": "Referrer Policy is set to 'no-referrer'"}, {"test_expansion": [{"delivery_value": "no-referrer-when-downgrade", "origin": ["same-http", "cross-http"], "delivery_type": "*", "name": "insecure-protocol", "expectation": "stripped-referrer", "expansion": "default", "redirection": "*", "source_context_list": "*", "source_scheme": "http", "subresource": "*"}, {"delivery_value": "no-referrer-when-downgrade", "origin": ["same-https", "cross-https"], "delivery_type": "*", "name": "upgrade-protocol", "expectation": "stripped-referrer", "expansion": "default", "redirection": "*", "source_context_list": "*", "source_scheme": "http", "subresource": "*"}, {"delivery_value": "no-referrer-when-downgrade", "origin": ["same-http", "cross-http"], "delivery_type": "*", "name": "downgrade-protocol", "expectation": "omitted", "expansion": "default", "redirection": "*", "source_context_list": "*", "source_scheme": "https", "subresource": "*"}, {"delivery_value": "no-referrer-when-downgrade", "origin": ["same-https", "cross-https"], "delivery_type": "*", "name": "secure-protocol", "expectation": "stripped-referrer", "expansion": "default", "redirection": "*", "source_context_list": "*", "source_scheme": "https", "subresource": "*"}], "description": "Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.", "specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade", "name": "no-referrer-when-downgrade", "title": "Referrer Policy is set to 'no-referrer-when-downgrade'"}, {"test_expansion": [{"delivery_value": "origin", "origin": "*", "delivery_type": "*", "name": "generic", "expectation": "origin", "expansion": "default", "redirection": "*", "source_context_list": "*", "source_scheme": "*", "subresource": "*"}], "description": "Check that all subresources in all casses get only the origin portion of the referrer URL.", "specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin", "name": "origin", "title": "Referrer Policy is set to 'origin'"}, {"test_expansion": [{"delivery_value": "same-origin", "origin": "same-http", "delivery_type": "*", "name": "same-origin-insecure", "expectation": "stripped-referrer", "expansion": "default", "redirection": "*", "source_context_list": "*", "source_scheme": "http", "subresource": "*"}, {"delivery_value": "same-origin", "origin": "same-https", "delivery_type": "*", "name": "same-origin-secure-default", "expectation": "stripped-referrer", "expansion": "default", "redirection": "*", "source_context_list": "*", "source_scheme": "https", "subresource": "*"}, {"delivery_value": "same-origin", "origin": ["same-http", "same-https"], "delivery_type": "*", "name": "same-origin-insecure", "expectation": "omitted", "expansion": "override", "redirection": "swap-origin", "source_context_list": "*", "source_scheme": "*", "subresource": "*"}, {"delivery_value": "same-origin", "origin": ["cross-http", "cross-https"], "delivery_type": "*", "name": "cross-origin", "expectation": "omitted", "expansion": "default", "redirection": "*", "source_context_list": "*", "source_scheme": "*", "subresource": "*"}], "description": "Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.", "specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin", "name": "same-origin", "title": "Referrer Policy is set to 'same-origin'"}, {"test_expansion": [{"delivery_value": "origin-when-cross-origin", "origin": "same-http", "delivery_type": "*", "name": "same-origin-insecure", "expectation": "stripped-referrer", "expansion": "default", "redirection": "*", "source_context_list": "*", "source_scheme": "http", "subresource": "*"}, {"delivery_value": "origin-when-cross-origin", "origin": "same-https", "delivery_type": "*", "name": "same-origin-secure-default", "expectation": "stripped-referrer", "expansion": "default", "redirection": "*", "source_context_list": "*", "source_scheme": "https", "subresource": "*"}, {"delivery_value": "origin-when-cross-origin", "origin": "same-https", "delivery_type": "*", "name": "same-origin-upgrade", "expectation": "origin", "expansion": "default", "redirection": "*", "source_context_list": "*", "source_scheme": "http", "subresource": "*"}, {"delivery_value": "origin-when-cross-origin", "origin": "same-http", "delivery_type": "*", "name": "same-origin-downgrade", "expectation": "origin", "expansion": "default", "redirection": "*", "source_context_list": "*", "source_scheme": "https", "subresource": "*"}, {"delivery_value": "origin-when-cross-origin", "origin": ["same-http", "same-https"], "delivery_type": "*", "name": "same-origin-insecure", "expectation": "origin", "expansion": "override", "redirection": "swap-origin", "source_context_list": "*", "source_scheme": "*", "subresource": "*"}, {"delivery_value": "origin-when-cross-origin", "origin": ["cross-http", "cross-https"], "delivery_type": "*", "name": "cross-origin", "expectation": "origin", "expansion": "default", "redirection": "*", "source_context_list": "*", "source_scheme": "*", "subresource": "*"}], "description": "Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.", "specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin", "name": "origin-when-cross-origin", "title": "Referrer Policy is set to 'origin-when-cross-origin'"}, {"test_expansion": [{"delivery_value": "strict-origin", "origin": ["same-http", "cross-http"], "delivery_type": "*", "name": "insecure-protocol", "expectation": "origin", "expansion": "default", "redirection": "*", "source_context_list": "*", "source_scheme": "http", "subresource": "*"}, {"delivery_value": "strict-origin", "origin": ["same-https", "cross-https"], "delivery_type": "*", "name": "upgrade-protocol", "expectation": "origin", "expansion": "default", "redirection": "*", "source_context_list": "*", "source_scheme": "http", "subresource": "*"}, {"delivery_value": "strict-origin", "origin": ["same-http", "cross-http"], "delivery_type": "*", "name": "downgrade-protocol", "expectation": "omitted", "expansion": "default", "redirection": "*", "source_context_list": "*", "source_scheme": "https", "subresource": "*"}, {"delivery_value": "strict-origin", "origin": ["same-https", "cross-https"], "delivery_type": "*", "name": "secure-protocol", "expectation": "origin", "expansion": "default", "redirection": "*", "source_context_list": "*", "source_scheme": "https", "subresource": "*"}], "description": "Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.", "specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin", "name": "strict-origin", "title": "Referrer Policy is set to 'strict-origin'"}, {"test_expansion": [{"delivery_value": "strict-origin-when-cross-origin", "origin": "same-http", "delivery_type": "*", "name": "same-insecure", "expectation": "stripped-referrer", "expansion": "default", "redirection": "*", "source_context_list": "*", "source_scheme": "http", "subresource": "*"}, {"delivery_value": "strict-origin-when-cross-origin", "origin": "same-http", "delivery_type": "*", "name": "same-insecure", "expectation": "origin", "expansion": "override", "redirection": "swap-origin", "source_context_list": "*", "source_scheme": "http", "subresource": "*"}, {"delivery_value": "strict-origin-when-cross-origin", "origin": "cross-http", "delivery_type": "*", "name": "cross-insecure", "expectation": "origin", "expansion": "default", "redirection": "*", "source_context_list": "*", "source_scheme": "http", "subresource": "*"}, {"delivery_value": "strict-origin-when-cross-origin", "origin": ["same-https", "cross-https"], "delivery_type": "*", "name": "upgrade-protocol", "expectation": "origin", "expansion": "default", "redirection": "*", "source_context_list": "*", "source_scheme": "http", "subresource": "*"}, {"delivery_value": "strict-origin-when-cross-origin", "origin": ["same-http", "cross-http"], "delivery_type": "*", "name": "downgrade-protocol", "expectation": "omitted", "expansion": "default", "redirection": "*", "source_context_list": "*", "source_scheme": "https", "subresource": "*"}, {"delivery_value": "strict-origin-when-cross-origin", "origin": "same-https", "delivery_type": "*", "name": "same-secure", "expectation": "stripped-referrer", "expansion": "default", "redirection": "*", "source_context_list": "*", "source_scheme": "https", "subresource": "*"}, {"delivery_value": "strict-origin-when-cross-origin", "origin": "same-https", "delivery_type": "*", "name": "same-secure", "expectation": "origin", "expansion": "override", "redirection": "swap-origin", "source_context_list": "*", "source_scheme": "https", "subresource": "*"}, {"delivery_value": "strict-origin-when-cross-origin", "origin": "cross-https", "delivery_type": "*", "name": "cross-secure", "expectation": "origin", "expansion": "default", "redirection": "*", "source_context_list": "*", "source_scheme": "https", "subresource": "*"}], "description": "Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.", "specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin", "name": "strict-origin-when-cross-origin", "title": "Referrer Policy is set to 'strict-origin-when-cross-origin'"}, {"test_expansion": [{"delivery_value": "unsafe-url", "origin": "*", "delivery_type": "*", "name": "generic", "expectation": "stripped-referrer", "expansion": "default", "redirection": "*", "source_context_list": "*", "source_scheme": "*", "subresource": "*"}], "description": "Check that all sub-resources get the stripped referrer URL.", "specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url", "name": "unsafe-url", "title": "Referrer Policy is set to 'unsafe-url'"}], "test_expansion_schema": {"delivery_value": [null, "no-referrer", "no-referrer-when-downgrade", "same-origin", "origin", "origin-when-cross-origin", "strict-origin", "strict-origin-when-cross-origin", "unsafe-url"], "origin": ["same-http", "same-https", "cross-http", "cross-https"], "delivery_type": ["attr", "rel-noref", "http-rp", "meta"], "subresource": ["iframe-tag", "img-tag", "script-tag", "a-tag", "area-tag", "xhr", "worker-classic", "worker-module", "sharedworker-classic", "fetch"], "expectation": ["omitted", "origin", "stripped-referrer"], "expansion": ["default", "override"], "redirection": ["no-redirect", "keep-origin", "swap-origin"], "source_context_list": ["top", "req", "srcdoc-inherit", "srcdoc", "iframe", "worker-classic", "worker-classic-data", "worker-module", "worker-module-data"], "source_scheme": ["http", "https"]}, "source_context_list_schema": {"srcdoc-inherit": {"subresourcePolicyDeliveries": [], "description": "srcdoc iframe should inherit parent Document's policy", "sourceContextList": [{"sourceContextType": "top", "policyDeliveries": ["policy"]}, {"sourceContextType": "srcdoc"}]}, "worker-module": {"subresourcePolicyDeliveries": [], "sourceContextList": [{"sourceContextType": "top", "policyDeliveries": ["anotherPolicy"]}, {"sourceContextType": "worker-module", "policyDeliveries": ["policy"]}]}, "worker-module-data": {"subresourcePolicyDeliveries": [], "sourceContextList": [{"sourceContextType": "top", "policyDeliveries": ["anotherPolicy"]}, {"sourceContextType": "worker-module-data", "policyDeliveries": ["policy"]}]}, "worker-classic-data": {"subresourcePolicyDeliveries": [], "sourceContextList": [{"sourceContextType": "top", "policyDeliveries": ["anotherPolicy"]}, {"sourceContextType": "worker-classic-data", "policyDeliveries": ["policy"]}]}, "top": {"subresourcePolicyDeliveries": [], "description": "Policy set by the top-level Document", "sourceContextList": [{"sourceContextType": "top", "policyDeliveries": ["policy"]}]}, "req": {"subresourcePolicyDeliveries": ["nonNullPolicy"], "description": "Subresource request's policy should override Document's policy", "sourceContextList": [{"sourceContextType": "top", "policyDeliveries": ["anotherPolicy"]}]}, "worker-classic": {"subresourcePolicyDeliveries": [], "sourceContextList": [{"sourceContextType": "top", "policyDeliveries": ["anotherPolicy"]}, {"sourceContextType": "worker-classic", "policyDeliveries": ["policy"]}]}, "iframe": {"subresourcePolicyDeliveries": [], "description": "external iframe's policy should override parent Document's policy", "sourceContextList": [{"sourceContextType": "top", "policyDeliveries": ["anotherPolicy"]}, {"sourceContextType": "iframe", "policyDeliveries": ["policy"]}]}, "srcdoc": {"subresourcePolicyDeliveries": [], "description": "srcdoc iframe's policy should override parent Document's policy", "sourceContextList": [{"sourceContextType": "top", "policyDeliveries": ["anotherPolicy"]}, {"sourceContextType": "srcdoc", "policyDeliveries": ["nonNullPolicy"]}]}}, "delivery_key": "referrerPolicy", "source_context_schema": {"supported_delivery_type": {"iframe": ["meta", "http-rp"], "worker-module-data": [], "worker-classic-data": [], "top": ["meta", "http-rp"], "worker-classic": ["http-rp"], "worker-module": ["http-rp"], "srcdoc": ["meta"]}, "supported_subresource": {"iframe": "*", "worker-module-data": ["xhr", "fetch"], "worker-classic-data": ["xhr", "fetch"], "top": "*", "worker-classic": ["xhr", "fetch", "worker-classic", "worker-module"], "worker-module": ["xhr", "fetch", "worker-classic", "worker-module"], "srcdoc": "*"}}};
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/cross-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/cross-insecure.http.html
deleted file mode 100644
index a65eaa7901b..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/cross-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via fetch-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/cross-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/cross-insecure.http.html.headers
deleted file mode 100644
index d74467b0af6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/cross-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/no-redirect/cross-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/no-redirect/cross-insecure.http.html
deleted file mode 100644
index 7d5e9f51eef..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/no-redirect/cross-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via fetch-request using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/no-redirect/cross-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/no-redirect/cross-insecure.http.html.headers
deleted file mode 100644
index d74467b0af6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/no-redirect/cross-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/cross-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/cross-insecure.http.html
deleted file mode 100644
index bac63c5fb0e..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/cross-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via fetch-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/cross-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/cross-insecure.http.html.headers
deleted file mode 100644
index d74467b0af6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/cross-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-insecure.http.html
deleted file mode 100644
index 60d5073c3fc..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via iframe-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-insecure.http.html.headers
deleted file mode 100644
index d74467b0af6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/no-redirect/cross-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/no-redirect/cross-insecure.http.html
deleted file mode 100644
index 6be18f7699d..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/no-redirect/cross-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via iframe-tag using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/no-redirect/cross-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/no-redirect/cross-insecure.http.html.headers
deleted file mode 100644
index d74467b0af6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/no-redirect/cross-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-insecure.http.html
deleted file mode 100644
index 952e77c9cc6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via iframe-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-insecure.http.html.headers
deleted file mode 100644
index d74467b0af6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/cross-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/cross-insecure.http.html
deleted file mode 100644
index 48f71be2eb1..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/cross-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via img-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/cross-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/cross-insecure.http.html.headers
deleted file mode 100644
index d74467b0af6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/cross-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/no-redirect/cross-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/no-redirect/cross-insecure.http.html
deleted file mode 100644
index a28deb3c0dc..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/no-redirect/cross-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via img-tag using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/no-redirect/cross-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/no-redirect/cross-insecure.http.html.headers
deleted file mode 100644
index d74467b0af6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/no-redirect/cross-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/cross-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/cross-insecure.http.html
deleted file mode 100644
index 2ebcc268d93..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/cross-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via img-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/cross-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/cross-insecure.http.html.headers
deleted file mode 100644
index d74467b0af6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/cross-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/cross-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/cross-insecure.http.html
deleted file mode 100644
index 6425c693b33..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/cross-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via script-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/cross-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/cross-insecure.http.html.headers
deleted file mode 100644
index d74467b0af6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/cross-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/no-redirect/cross-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/no-redirect/cross-insecure.http.html
deleted file mode 100644
index fcae5517b70..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/no-redirect/cross-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via script-tag using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/no-redirect/cross-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/no-redirect/cross-insecure.http.html.headers
deleted file mode 100644
index d74467b0af6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/no-redirect/cross-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/cross-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/cross-insecure.http.html
deleted file mode 100644
index 92437dea18b..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/cross-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via script-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/cross-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/cross-insecure.http.html.headers
deleted file mode 100644
index d74467b0af6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/cross-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/cross-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/cross-insecure.http.html
deleted file mode 100644
index 9d2f1dc7bb0..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/cross-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via xhr-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/cross-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/cross-insecure.http.html.headers
deleted file mode 100644
index d74467b0af6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/cross-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/no-redirect/cross-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/no-redirect/cross-insecure.http.html
deleted file mode 100644
index 77a7c7198da..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/no-redirect/cross-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via xhr-request using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/no-redirect/cross-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/no-redirect/cross-insecure.http.html.headers
deleted file mode 100644
index d74467b0af6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/no-redirect/cross-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/cross-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/cross-insecure.http.html
deleted file mode 100644
index 490c294ced5..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/cross-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via xhr-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/cross-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/cross-insecure.http.html.headers
deleted file mode 100644
index d74467b0af6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/cross-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index bb47761b3b5..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via fetch-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index d74467b0af6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 4dc7edb6f57..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via fetch-request using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index d74467b0af6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 11d7fe3e261..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via fetch-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index d74467b0af6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 12e2c923aa9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via iframe-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index d74467b0af6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 269c233f650..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via iframe-tag using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index d74467b0af6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 3dc041adb2b..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via iframe-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index d74467b0af6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 7985b8b5397..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via img-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index d74467b0af6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 6f2526ec2ce..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via img-tag using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index d74467b0af6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 408a84a46e9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via img-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index d74467b0af6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 73a6d401686..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via script-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index d74467b0af6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index db3836944c0..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via script-tag using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index d74467b0af6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 3e93e19a718..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via script-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index d74467b0af6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index f556a17b5f4..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via xhr-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index d74467b0af6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 966ccd4a906..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via xhr-request using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index d74467b0af6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index b0f1c512bb3..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via xhr-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index d74467b0af6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/same-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/same-insecure.http.html
deleted file mode 100644
index 3c24da11403..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/same-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via fetch-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/same-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/same-insecure.http.html.headers
deleted file mode 100644
index d74467b0af6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/same-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/no-redirect/same-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/no-redirect/same-insecure.http.html
deleted file mode 100644
index 5147d1ae55f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/no-redirect/same-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via fetch-request using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/no-redirect/same-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/no-redirect/same-insecure.http.html.headers
deleted file mode 100644
index d74467b0af6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/no-redirect/same-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/same-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/same-insecure.http.html
deleted file mode 100644
index 5f043f56d9c..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/same-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via fetch-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/same-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/same-insecure.http.html.headers
deleted file mode 100644
index d74467b0af6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/same-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/same-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/same-insecure.http.html
deleted file mode 100644
index 7235b46f693..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/same-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via iframe-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/same-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/same-insecure.http.html.headers
deleted file mode 100644
index d74467b0af6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/same-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/no-redirect/same-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/no-redirect/same-insecure.http.html
deleted file mode 100644
index 898791470cd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/no-redirect/same-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via iframe-tag using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/no-redirect/same-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/no-redirect/same-insecure.http.html.headers
deleted file mode 100644
index d74467b0af6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/no-redirect/same-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/same-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/same-insecure.http.html
deleted file mode 100644
index 915a0e04cb1..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/same-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via iframe-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/same-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/same-insecure.http.html.headers
deleted file mode 100644
index d74467b0af6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/same-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/same-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/same-insecure.http.html
deleted file mode 100644
index 2b5c254b315..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/same-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via img-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/same-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/same-insecure.http.html.headers
deleted file mode 100644
index d74467b0af6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/same-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/no-redirect/same-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/no-redirect/same-insecure.http.html
deleted file mode 100644
index 448fc03146a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/no-redirect/same-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via img-tag using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/no-redirect/same-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/no-redirect/same-insecure.http.html.headers
deleted file mode 100644
index d74467b0af6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/no-redirect/same-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/same-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/same-insecure.http.html
deleted file mode 100644
index b71a1ba2fea..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/same-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via img-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/same-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/same-insecure.http.html.headers
deleted file mode 100644
index d74467b0af6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/same-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/same-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/same-insecure.http.html
deleted file mode 100644
index c23f33e377c..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/same-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via module-worker using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "module-worker",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/same-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/same-insecure.http.html.headers
deleted file mode 100644
index d74467b0af6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/same-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/module-worker/no-redirect/same-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/module-worker/no-redirect/same-insecure.http.html
deleted file mode 100644
index 0f8a6123318..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/module-worker/no-redirect/same-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via module-worker using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "module-worker",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/module-worker/no-redirect/same-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/module-worker/no-redirect/same-insecure.http.html.headers
deleted file mode 100644
index d74467b0af6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/module-worker/no-redirect/same-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/same-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/same-insecure.http.html
deleted file mode 100644
index 25e7bed4966..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/same-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via script-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/same-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/same-insecure.http.html.headers
deleted file mode 100644
index d74467b0af6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/same-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/no-redirect/same-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/no-redirect/same-insecure.http.html
deleted file mode 100644
index 0366ca590a2..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/no-redirect/same-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via script-tag using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/no-redirect/same-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/no-redirect/same-insecure.http.html.headers
deleted file mode 100644
index d74467b0af6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/no-redirect/same-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/same-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/same-insecure.http.html
deleted file mode 100644
index e43090fc94d..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/same-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via script-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/same-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/same-insecure.http.html.headers
deleted file mode 100644
index d74467b0af6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/same-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/same-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/same-insecure.http.html
deleted file mode 100644
index 94737a8ad11..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/same-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via shared-worker using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "shared-worker",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/same-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/same-insecure.http.html.headers
deleted file mode 100644
index d74467b0af6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/same-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/shared-worker/no-redirect/same-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/shared-worker/no-redirect/same-insecure.http.html
deleted file mode 100644
index 7f20701fc23..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/shared-worker/no-redirect/same-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via shared-worker using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "shared-worker",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/shared-worker/no-redirect/same-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/shared-worker/no-redirect/same-insecure.http.html.headers
deleted file mode 100644
index d74467b0af6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/shared-worker/no-redirect/same-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/same-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/same-insecure.http.html
deleted file mode 100644
index 1e0251a14db..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/same-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via worker-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "worker-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/same-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/same-insecure.http.html.headers
deleted file mode 100644
index d74467b0af6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/same-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/worker-request/no-redirect/same-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/worker-request/no-redirect/same-insecure.http.html
deleted file mode 100644
index a04b093f052..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/worker-request/no-redirect/same-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via worker-request using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "worker-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/worker-request/no-redirect/same-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/worker-request/no-redirect/same-insecure.http.html.headers
deleted file mode 100644
index d74467b0af6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/worker-request/no-redirect/same-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/same-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/same-insecure.http.html
deleted file mode 100644
index 4c888a8955a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/same-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via xhr-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/same-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/same-insecure.http.html.headers
deleted file mode 100644
index d74467b0af6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/same-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/no-redirect/same-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/no-redirect/same-insecure.http.html
deleted file mode 100644
index ea5c378b938..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/no-redirect/same-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via xhr-request using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/no-redirect/same-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/no-redirect/same-insecure.http.html.headers
deleted file mode 100644
index d74467b0af6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/no-redirect/same-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/same-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/same-insecure.http.html
deleted file mode 100644
index f95d9dcf862..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/same-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via xhr-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/same-insecure.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/same-insecure.http.html.headers
deleted file mode 100644
index d74467b0af6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/same-insecure.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 805c1fce6ec..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via fetch-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index d74467b0af6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 3be3cef8fe6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via fetch-request using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index d74467b0af6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 001876c67ea..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via fetch-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index d74467b0af6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index d065511201c..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via iframe-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index d74467b0af6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 8372e89bb96..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via iframe-tag using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index d74467b0af6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 0cb91426123..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via iframe-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index d74467b0af6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 880ac954014..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via img-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index d74467b0af6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index d1e21f26bee..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via img-tag using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index d74467b0af6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 81ea510e482..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via img-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index d74467b0af6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 66353279841..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via script-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index d74467b0af6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index d9bc87d7ed1..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via script-tag using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index d74467b0af6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index f4c0db2b33b..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via script-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index d74467b0af6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index e0a4c18164a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via xhr-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index d74467b0af6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index ddf12c7dfbc..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via xhr-request using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index d74467b0af6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 967c856ca94..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via xhr-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index d74467b0af6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/fetch-request/keep-origin-redirect/cross-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/fetch-request/keep-origin-redirect/cross-insecure.http.html
deleted file mode 100644
index 1d53a856484..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/fetch-request/keep-origin-redirect/cross-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="strict-origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via fetch-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/fetch-request/no-redirect/cross-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/fetch-request/no-redirect/cross-insecure.http.html
deleted file mode 100644
index 11002b84ccd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/fetch-request/no-redirect/cross-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="strict-origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via fetch-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/fetch-request/swap-origin-redirect/cross-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/fetch-request/swap-origin-redirect/cross-insecure.http.html
deleted file mode 100644
index 0660a7152c1..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/fetch-request/swap-origin-redirect/cross-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="strict-origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via fetch-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-insecure.http.html
deleted file mode 100644
index 6dcd7f6fb5c..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/cross-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="strict-origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via iframe-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/iframe-tag/no-redirect/cross-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/iframe-tag/no-redirect/cross-insecure.http.html
deleted file mode 100644
index 0776180d9a2..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/iframe-tag/no-redirect/cross-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="strict-origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via iframe-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-insecure.http.html
deleted file mode 100644
index 38e9578454e..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/cross-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="strict-origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via iframe-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/cross-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/cross-insecure.http.html
deleted file mode 100644
index ab822dec774..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/cross-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="strict-origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via script-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/script-tag/no-redirect/cross-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/script-tag/no-redirect/cross-insecure.http.html
deleted file mode 100644
index c51ebf6c472..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/script-tag/no-redirect/cross-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="strict-origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via script-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/cross-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/cross-insecure.http.html
deleted file mode 100644
index 14ee299d92a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/cross-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="strict-origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via script-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/xhr-request/keep-origin-redirect/cross-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/xhr-request/keep-origin-redirect/cross-insecure.http.html
deleted file mode 100644
index ead14cf5f9d..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/xhr-request/keep-origin-redirect/cross-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="strict-origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via xhr-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/xhr-request/no-redirect/cross-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/xhr-request/no-redirect/cross-insecure.http.html
deleted file mode 100644
index 1ee7fd41367..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/xhr-request/no-redirect/cross-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="strict-origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via xhr-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/xhr-request/swap-origin-redirect/cross-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/xhr-request/swap-origin-redirect/cross-insecure.http.html
deleted file mode 100644
index 0110bf0e34f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/xhr-request/swap-origin-redirect/cross-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="strict-origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via xhr-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 05ade9a9562..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="strict-origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via fetch-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index ad0fa26cee5..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="strict-origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via fetch-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 074dc1c008c..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="strict-origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via fetch-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 02a8550756e..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="strict-origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via iframe-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index c67cc2478a0..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="strict-origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via iframe-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index e53c8315664..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="strict-origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via iframe-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 5c8ef0ef3e3..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="strict-origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via script-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index bb9bf2c1ee5..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="strict-origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via script-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index a4798d7b47d..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="strict-origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via script-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 0b58c64c200..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="strict-origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via xhr-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 3ab27355d09..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="strict-origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via xhr-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 6c8d7ecd7b8..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="strict-origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via xhr-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/fetch-request/keep-origin-redirect/same-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/fetch-request/keep-origin-redirect/same-insecure.http.html
deleted file mode 100644
index efcd74ac789..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/fetch-request/keep-origin-redirect/same-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="strict-origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via fetch-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/fetch-request/no-redirect/same-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/fetch-request/no-redirect/same-insecure.http.html
deleted file mode 100644
index eb84455bc12..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/fetch-request/no-redirect/same-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="strict-origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via fetch-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/fetch-request/swap-origin-redirect/same-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/fetch-request/swap-origin-redirect/same-insecure.http.html
deleted file mode 100644
index dc71fc362ed..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/fetch-request/swap-origin-redirect/same-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="strict-origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via fetch-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/same-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/same-insecure.http.html
deleted file mode 100644
index 8752f5d2cc8..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/same-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="strict-origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via iframe-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/iframe-tag/no-redirect/same-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/iframe-tag/no-redirect/same-insecure.http.html
deleted file mode 100644
index 4c3a3e733dd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/iframe-tag/no-redirect/same-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="strict-origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via iframe-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/same-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/same-insecure.http.html
deleted file mode 100644
index 33640559429..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/same-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="strict-origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via iframe-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/module-worker/keep-origin-redirect/same-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/module-worker/keep-origin-redirect/same-insecure.http.html
deleted file mode 100644
index dbffdfd9b70..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/module-worker/keep-origin-redirect/same-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="strict-origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via module-worker using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "module-worker",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/module-worker/no-redirect/same-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/module-worker/no-redirect/same-insecure.http.html
deleted file mode 100644
index ac598a4aef9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/module-worker/no-redirect/same-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="strict-origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via module-worker using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "module-worker",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/script-tag/keep-origin-redirect/same-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/script-tag/keep-origin-redirect/same-insecure.http.html
deleted file mode 100644
index fe796af905d..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/script-tag/keep-origin-redirect/same-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="strict-origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via script-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/script-tag/no-redirect/same-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/script-tag/no-redirect/same-insecure.http.html
deleted file mode 100644
index df0b66b578a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/script-tag/no-redirect/same-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="strict-origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via script-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/script-tag/swap-origin-redirect/same-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/script-tag/swap-origin-redirect/same-insecure.http.html
deleted file mode 100644
index 3e6a5ef1e50..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/script-tag/swap-origin-redirect/same-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="strict-origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via script-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/shared-worker/keep-origin-redirect/same-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/shared-worker/keep-origin-redirect/same-insecure.http.html
deleted file mode 100644
index fc8d3c41bbb..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/shared-worker/keep-origin-redirect/same-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="strict-origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via shared-worker using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "shared-worker",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/shared-worker/no-redirect/same-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/shared-worker/no-redirect/same-insecure.http.html
deleted file mode 100644
index 3291f436ea9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/shared-worker/no-redirect/same-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="strict-origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via shared-worker using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "shared-worker",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/worker-request/keep-origin-redirect/same-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/worker-request/keep-origin-redirect/same-insecure.http.html
deleted file mode 100644
index 19ad046a8a6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/worker-request/keep-origin-redirect/same-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="strict-origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via worker-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "worker-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/worker-request/no-redirect/same-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/worker-request/no-redirect/same-insecure.http.html
deleted file mode 100644
index c8fe4c6ec6f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/worker-request/no-redirect/same-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="strict-origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via worker-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "worker-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/xhr-request/keep-origin-redirect/same-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/xhr-request/keep-origin-redirect/same-insecure.http.html
deleted file mode 100644
index ec2f7efe8ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/xhr-request/keep-origin-redirect/same-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="strict-origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via xhr-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/xhr-request/no-redirect/same-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/xhr-request/no-redirect/same-insecure.http.html
deleted file mode 100644
index 207a092d679..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/xhr-request/no-redirect/same-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="strict-origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via xhr-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/xhr-request/swap-origin-redirect/same-insecure.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/xhr-request/swap-origin-redirect/same-insecure.http.html
deleted file mode 100644
index 6ca54f81610..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/xhr-request/swap-origin-redirect/same-insecure.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="strict-origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via xhr-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 6d3dc7018c6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="strict-origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via fetch-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 685cb213ab0..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="strict-origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via fetch-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 65b84cbd52e..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="strict-origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via fetch-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 931a865b0a0..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="strict-origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via iframe-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 44da9c8838e..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="strict-origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via iframe-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 3e272c6f36d..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="strict-origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via iframe-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index bfb222a4475..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="strict-origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via script-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index e989b00ce58..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="strict-origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via script-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index a1f1e0e6f1b..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="strict-origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via script-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index ec4786e1e4d..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="strict-origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via xhr-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index baee333cbb8..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="strict-origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via xhr-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 2041b46c26c..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title>
- <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="strict-origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via xhr-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 0db6b0fbc2e..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via fetch-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index 07af8e286fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index 95eb256986e..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via fetch-request using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index 07af8e286fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 59de544a1c0..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via fetch-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index 07af8e286fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 42dffc718dd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via iframe-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index 07af8e286fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index a1c0ad2ecbd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via iframe-tag using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index 07af8e286fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 4214ed39789..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via iframe-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index 07af8e286fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index c74fdf48aa7..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via img-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index 07af8e286fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index d6c256cdd00..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via img-tag using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index 07af8e286fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 84f50a7242b..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via img-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index 07af8e286fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index a4c9484c8c0..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via script-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index 07af8e286fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index 5ff57615500..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via script-tag using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index 07af8e286fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 214d0a41e68..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via script-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index 07af8e286fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 21f6bd1faaa..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via xhr-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index 07af8e286fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index a7054707dc4..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via xhr-request using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index 07af8e286fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 62dbdaff92b..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via xhr-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index 07af8e286fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index b537c0352c1..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via fetch-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index 07af8e286fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 0881853070c..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via fetch-request using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index 07af8e286fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 390e5a114d0..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via fetch-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index 07af8e286fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 21ec099f4cf..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via iframe-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index 07af8e286fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 9c05e66587a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via iframe-tag using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index 07af8e286fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 2bba3d1b958..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via iframe-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index 07af8e286fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 4e46c27514d..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via img-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index 07af8e286fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 43b78c36946..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via img-tag using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index 07af8e286fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 745f65c0488..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via img-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index 07af8e286fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index e503b77b05c..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via script-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index 07af8e286fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 9067040bb86..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via script-tag using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index 07af8e286fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 7b2f46326a3..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via script-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index 07af8e286fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index e471c1fb030..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via xhr-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index 07af8e286fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index dda3d2fb493..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via xhr-request using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index 07af8e286fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 5e3c7911cd7..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via xhr-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index 07af8e286fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index d68b3f0d60b..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via fetch-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index 07af8e286fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index 0d32296e8fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via fetch-request using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index 07af8e286fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index e0fe2ed9eca..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via fetch-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index 07af8e286fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 5a66aa2ca70..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via iframe-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index 07af8e286fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index 228473d37a4..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via iframe-tag using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index 07af8e286fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 556a260ea63..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via iframe-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index 07af8e286fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index e9f49f4ed9a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via img-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index 07af8e286fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index e225adb44b6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via img-tag using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index 07af8e286fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index a2a97e73d1e..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via img-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index 07af8e286fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index eae326f66c1..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via module-worker using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "module-worker",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index 07af8e286fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/module-worker/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/module-worker/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index 870b555c7b4..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/module-worker/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via module-worker using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "module-worker",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/module-worker/no-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/module-worker/no-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index 07af8e286fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/module-worker/no-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 92186b38318..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via script-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index 07af8e286fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index 924ebe5e76c..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via script-tag using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index 07af8e286fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 8e374ad73ae..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via script-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index 07af8e286fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 698ba1f52dc..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via shared-worker using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "shared-worker",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index 07af8e286fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/shared-worker/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/shared-worker/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index c3eead4ac0c..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/shared-worker/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via shared-worker using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "shared-worker",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/shared-worker/no-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/shared-worker/no-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index 07af8e286fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/shared-worker/no-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index b1c1f720a14..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via worker-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "worker-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index 07af8e286fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/worker-request/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/worker-request/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index f0082510aaf..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/worker-request/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via worker-request using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "worker-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/worker-request/no-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/worker-request/no-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index 07af8e286fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/worker-request/no-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index dbb8da1e03c..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via xhr-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index 07af8e286fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index 09aeb8fc143..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via xhr-request using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index 07af8e286fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index e2f73ada79c..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via xhr-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html.headers
deleted file mode 100644
index 07af8e286fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 637f7d80196..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via fetch-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index 07af8e286fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 649574394f1..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via fetch-request using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index 07af8e286fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 1bb79c1f38a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via fetch-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index 07af8e286fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index a9053cc0649..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via iframe-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index 07af8e286fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index c7536fc5080..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via iframe-tag using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index 07af8e286fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index b27ed1830b6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via iframe-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index 07af8e286fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 39a7b701c33..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via img-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index 07af8e286fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 27f637f8447..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via img-tag using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index 07af8e286fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 3c11a22da1c..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via img-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index 07af8e286fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index b02da368869..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via script-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index 07af8e286fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 5f542a4c16c..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via script-tag using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index 07af8e286fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index a5a9a71c2d1..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via script-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index 07af8e286fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index be363d79516..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via xhr-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index 07af8e286fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 04e317062aa..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via xhr-request using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index 07af8e286fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 3504c73637c..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via xhr-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html.headers
deleted file mode 100644
index 07af8e286fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: strict-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 2177b2407fb..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="strict-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via fetch-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index 54b2947dc66..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="strict-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via fetch-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 94f10a8e9de..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="strict-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via fetch-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 9463f5394ad..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="strict-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via iframe-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index 3838698b0a8..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="strict-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via iframe-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 5a1df9c256b..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="strict-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via iframe-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 71a0b692afb..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="strict-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via script-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index 48861eb9bb7..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="strict-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via script-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index c63d9a1608c..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="strict-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via script-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index e2143e1a320..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="strict-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via xhr-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index b8d84f7726c..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="strict-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via xhr-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 4f36a9cb357..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="strict-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via xhr-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 8edd239db2f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="strict-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via fetch-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 873b26a46eb..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="strict-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via fetch-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index f0d5c81eca2..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="strict-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via fetch-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index c985a404544..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="strict-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via iframe-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 9881576a69b..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="strict-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via iframe-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 203c5e73cbe..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="strict-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via iframe-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 20a3252bf2f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="strict-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via script-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index d48173ffecc..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="strict-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via script-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index c5a1548b12d..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="strict-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via script-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 0ee367c9316..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="strict-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via xhr-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 3e6c3a175f1..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="strict-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via xhr-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 533a22a7241..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="strict-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via xhr-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 32aab014434..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="strict-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via fetch-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index a92d87e2782..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="strict-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via fetch-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 6f9417785ff..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="strict-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via fetch-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index ad8d9e7f190..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="strict-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via iframe-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index a218fb4980d..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="strict-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via iframe-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index f3fed6c88b8..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="strict-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via iframe-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/module-worker/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/module-worker/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index a991f0c6757..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/module-worker/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="strict-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via module-worker using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "module-worker",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/module-worker/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/module-worker/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index 1546f57a7df..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/module-worker/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="strict-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via module-worker using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "module-worker",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 3877c0cbaa2..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="strict-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via script-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index 8542943aabe..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="strict-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via script-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index f688eda4732..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="strict-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via script-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/shared-worker/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/shared-worker/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index aefc8786e2c..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/shared-worker/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="strict-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via shared-worker using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "shared-worker",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/shared-worker/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/shared-worker/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index 107e1ca1a67..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/shared-worker/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="strict-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via shared-worker using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "shared-worker",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/worker-request/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/worker-request/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 2b4472d3554..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/worker-request/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="strict-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via worker-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "worker-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/worker-request/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/worker-request/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index 5889d9e90f2..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/worker-request/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="strict-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via worker-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "worker-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 2edd19df54f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="strict-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via xhr-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index 418e84a8210..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="strict-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via xhr-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index d46cf842c63..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="strict-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an http
- sub-resource via xhr-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 538500ad734..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="strict-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via fetch-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 58da77e1a29..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="strict-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via fetch-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 85dab619c2b..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="strict-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via fetch-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 92c2b51d15e..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="strict-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via iframe-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index b9818652513..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="strict-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via iframe-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 20f21df5657..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="strict-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via iframe-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 7cb4aaf0943..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="strict-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via script-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index e7caa273156..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="strict-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via script-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index b0fc558d76e..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="strict-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via script-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index bac4c36dfe5..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="strict-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via xhr-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 0d76c92864d..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="strict-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via xhr-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 2b24a45ec52..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title>
- <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.">
- <meta name="referrer" content="strict-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via xhr-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "strict-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html
deleted file mode 100644
index a82cc859c33..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via fetch-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index c67e5215843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: unsafe-url
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/fetch-request/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/fetch-request/no-redirect/generic.http.html
deleted file mode 100644
index 8f57b3335ac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/fetch-request/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via fetch-request using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/fetch-request/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/fetch-request/no-redirect/generic.http.html.headers
deleted file mode 100644
index c67e5215843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/fetch-request/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: unsafe-url
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html
deleted file mode 100644
index 3991c324090..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via fetch-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html.headers
deleted file mode 100644
index c67e5215843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: unsafe-url
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html
deleted file mode 100644
index f61537ab2b7..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via iframe-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index c67e5215843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: unsafe-url
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html
deleted file mode 100644
index 5dfb2f8a164..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via iframe-tag using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html.headers
deleted file mode 100644
index c67e5215843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: unsafe-url
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html
deleted file mode 100644
index 50010aaeafa..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via iframe-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html.headers
deleted file mode 100644
index c67e5215843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: unsafe-url
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html
deleted file mode 100644
index d17712e1d17..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via img-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index c67e5215843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: unsafe-url
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/no-redirect/generic.http.html
deleted file mode 100644
index e514cb738d3..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via img-tag using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/no-redirect/generic.http.html.headers
deleted file mode 100644
index c67e5215843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: unsafe-url
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html
deleted file mode 100644
index 679128d15f3..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via img-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html.headers
deleted file mode 100644
index c67e5215843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: unsafe-url
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 8afd60eabca..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via script-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index c67e5215843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: unsafe-url
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/script-tag/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/script-tag/no-redirect/generic.http.html
deleted file mode 100644
index f63430fde91..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/script-tag/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via script-tag using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/script-tag/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/script-tag/no-redirect/generic.http.html.headers
deleted file mode 100644
index c67e5215843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/script-tag/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: unsafe-url
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html
deleted file mode 100644
index 6f78f7ab581..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via script-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html.headers
deleted file mode 100644
index c67e5215843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: unsafe-url
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 10fca8ad729..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via xhr-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index c67e5215843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: unsafe-url
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/xhr-request/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/xhr-request/no-redirect/generic.http.html
deleted file mode 100644
index f60d3ed06cc..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/xhr-request/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via xhr-request using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/xhr-request/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/xhr-request/no-redirect/generic.http.html.headers
deleted file mode 100644
index c67e5215843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/xhr-request/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: unsafe-url
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html
deleted file mode 100644
index 44b1b21a711..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via xhr-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html.headers
deleted file mode 100644
index c67e5215843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: unsafe-url
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html
deleted file mode 100644
index e9349686169..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via fetch-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index c67e5215843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: unsafe-url
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/fetch-request/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/fetch-request/no-redirect/generic.http.html
deleted file mode 100644
index 894676e8544..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/fetch-request/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via fetch-request using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/fetch-request/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/fetch-request/no-redirect/generic.http.html.headers
deleted file mode 100644
index c67e5215843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/fetch-request/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: unsafe-url
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html
deleted file mode 100644
index 42b84b21508..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via fetch-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html.headers
deleted file mode 100644
index c67e5215843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: unsafe-url
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 9383af1ee71..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via iframe-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index c67e5215843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: unsafe-url
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html
deleted file mode 100644
index 03c22def281..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via iframe-tag using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html.headers
deleted file mode 100644
index c67e5215843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: unsafe-url
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html
deleted file mode 100644
index f14ea6703b3..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via iframe-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html.headers
deleted file mode 100644
index c67e5215843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: unsafe-url
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html
deleted file mode 100644
index de791441ea7..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via img-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index c67e5215843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: unsafe-url
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/no-redirect/generic.http.html
deleted file mode 100644
index 83707cdee07..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via img-tag using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/no-redirect/generic.http.html.headers
deleted file mode 100644
index c67e5215843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: unsafe-url
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html
deleted file mode 100644
index 2b92b33df18..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via img-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html.headers
deleted file mode 100644
index c67e5215843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: unsafe-url
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 142267bd452..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via script-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index c67e5215843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: unsafe-url
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/script-tag/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/script-tag/no-redirect/generic.http.html
deleted file mode 100644
index 738f5c34ade..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/script-tag/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via script-tag using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/script-tag/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/script-tag/no-redirect/generic.http.html.headers
deleted file mode 100644
index c67e5215843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/script-tag/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: unsafe-url
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html
deleted file mode 100644
index a3be0469c9f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via script-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html.headers
deleted file mode 100644
index c67e5215843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: unsafe-url
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 29ac25d14a1..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via xhr-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index c67e5215843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: unsafe-url
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/xhr-request/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/xhr-request/no-redirect/generic.http.html
deleted file mode 100644
index 3a95f9f42b8..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/xhr-request/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via xhr-request using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/xhr-request/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/xhr-request/no-redirect/generic.http.html.headers
deleted file mode 100644
index c67e5215843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/xhr-request/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: unsafe-url
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html
deleted file mode 100644
index 177abec135b..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via xhr-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html.headers
deleted file mode 100644
index c67e5215843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: unsafe-url
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 5ba49e0acdd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via fetch-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index c67e5215843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: unsafe-url
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/fetch-request/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/fetch-request/no-redirect/generic.http.html
deleted file mode 100644
index 4bff34e02c9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/fetch-request/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via fetch-request using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/fetch-request/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/fetch-request/no-redirect/generic.http.html.headers
deleted file mode 100644
index c67e5215843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/fetch-request/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: unsafe-url
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html
deleted file mode 100644
index fa58ac157f2..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via fetch-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html.headers
deleted file mode 100644
index c67e5215843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: unsafe-url
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 4cf2262dab7..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via iframe-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index c67e5215843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: unsafe-url
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/iframe-tag/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/iframe-tag/no-redirect/generic.http.html
deleted file mode 100644
index aedf67b946b..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/iframe-tag/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via iframe-tag using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/iframe-tag/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/iframe-tag/no-redirect/generic.http.html.headers
deleted file mode 100644
index c67e5215843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/iframe-tag/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: unsafe-url
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html
deleted file mode 100644
index 4181c8a875f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via iframe-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html.headers
deleted file mode 100644
index c67e5215843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: unsafe-url
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html
deleted file mode 100644
index dc6f090b51b..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via img-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index c67e5215843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: unsafe-url
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/no-redirect/generic.http.html
deleted file mode 100644
index 22d449d42f4..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via img-tag using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/no-redirect/generic.http.html.headers
deleted file mode 100644
index c67e5215843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: unsafe-url
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html
deleted file mode 100644
index 1492be672bf..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via img-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html.headers
deleted file mode 100644
index c67e5215843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: unsafe-url
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/generic.http.html
deleted file mode 100644
index c35639823ec..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via module-worker using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "module-worker",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index c67e5215843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: unsafe-url
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/module-worker/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/module-worker/no-redirect/generic.http.html
deleted file mode 100644
index bc5f3bc3e94..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/module-worker/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via module-worker using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "module-worker",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/module-worker/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/module-worker/no-redirect/generic.http.html.headers
deleted file mode 100644
index c67e5215843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/module-worker/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: unsafe-url
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html
deleted file mode 100644
index c458763f10e..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via script-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index c67e5215843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: unsafe-url
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/script-tag/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/script-tag/no-redirect/generic.http.html
deleted file mode 100644
index 00e1d936324..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/script-tag/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via script-tag using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/script-tag/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/script-tag/no-redirect/generic.http.html.headers
deleted file mode 100644
index c67e5215843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/script-tag/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: unsafe-url
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html
deleted file mode 100644
index c17379cfad0..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via script-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html.headers
deleted file mode 100644
index c67e5215843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: unsafe-url
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/generic.http.html
deleted file mode 100644
index faca9b10f87..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via shared-worker using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "shared-worker",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index c67e5215843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: unsafe-url
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/shared-worker/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/shared-worker/no-redirect/generic.http.html
deleted file mode 100644
index b0c9e254228..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/shared-worker/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via shared-worker using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "shared-worker",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/shared-worker/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/shared-worker/no-redirect/generic.http.html.headers
deleted file mode 100644
index c67e5215843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/shared-worker/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: unsafe-url
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/generic.http.html
deleted file mode 100644
index ec8d76fc0c9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via worker-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "worker-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index c67e5215843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: unsafe-url
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/worker-request/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/worker-request/no-redirect/generic.http.html
deleted file mode 100644
index 3334b1aba36..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/worker-request/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via worker-request using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "worker-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/worker-request/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/worker-request/no-redirect/generic.http.html.headers
deleted file mode 100644
index c67e5215843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/worker-request/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: unsafe-url
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html
deleted file mode 100644
index cf19b751ec8..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via xhr-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index c67e5215843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: unsafe-url
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/xhr-request/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/xhr-request/no-redirect/generic.http.html
deleted file mode 100644
index 4c44cbce0d9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/xhr-request/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via xhr-request using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/xhr-request/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/xhr-request/no-redirect/generic.http.html.headers
deleted file mode 100644
index c67e5215843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/xhr-request/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: unsafe-url
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html
deleted file mode 100644
index 61889e61f95..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via xhr-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html.headers
deleted file mode 100644
index c67e5215843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: unsafe-url
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 35f3e69127d..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via fetch-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index c67e5215843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: unsafe-url
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/fetch-request/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/fetch-request/no-redirect/generic.http.html
deleted file mode 100644
index 9cc15eb4b90..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/fetch-request/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via fetch-request using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/fetch-request/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/fetch-request/no-redirect/generic.http.html.headers
deleted file mode 100644
index c67e5215843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/fetch-request/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: unsafe-url
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html
deleted file mode 100644
index dc5ffbd5de6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via fetch-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html.headers
deleted file mode 100644
index c67e5215843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: unsafe-url
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 2ac2803d0ed..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via iframe-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index c67e5215843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: unsafe-url
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/iframe-tag/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/iframe-tag/no-redirect/generic.http.html
deleted file mode 100644
index 5b22bbc5dce..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/iframe-tag/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via iframe-tag using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/iframe-tag/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/iframe-tag/no-redirect/generic.http.html.headers
deleted file mode 100644
index c67e5215843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/iframe-tag/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: unsafe-url
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html
deleted file mode 100644
index 125d2fb6c3d..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via iframe-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html.headers
deleted file mode 100644
index c67e5215843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: unsafe-url
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html
deleted file mode 100644
index bf9143c2874..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via img-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index c67e5215843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: unsafe-url
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/no-redirect/generic.http.html
deleted file mode 100644
index bdb66972d4a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via img-tag using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/no-redirect/generic.http.html.headers
deleted file mode 100644
index c67e5215843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: unsafe-url
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html
deleted file mode 100644
index 8aaeb884177..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via img-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html.headers
deleted file mode 100644
index c67e5215843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: unsafe-url
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html
deleted file mode 100644
index ff3cd97f497..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via script-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index c67e5215843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: unsafe-url
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/script-tag/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/script-tag/no-redirect/generic.http.html
deleted file mode 100644
index 3f38a8a242d..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/script-tag/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via script-tag using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/script-tag/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/script-tag/no-redirect/generic.http.html.headers
deleted file mode 100644
index c67e5215843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/script-tag/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: unsafe-url
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html
deleted file mode 100644
index b1d13cdf89d..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via script-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html.headers
deleted file mode 100644
index c67e5215843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: unsafe-url
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 6e02ec75c7d..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via xhr-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html.headers
deleted file mode 100644
index c67e5215843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: unsafe-url
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/xhr-request/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/xhr-request/no-redirect/generic.http.html
deleted file mode 100644
index dbba2048bac..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/xhr-request/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via xhr-request using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/xhr-request/no-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/xhr-request/no-redirect/generic.http.html.headers
deleted file mode 100644
index c67e5215843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/xhr-request/no-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: unsafe-url
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html
deleted file mode 100644
index f945a1d0c83..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via xhr-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html.headers
deleted file mode 100644
index c67e5215843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: unsafe-url
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html
deleted file mode 100644
index ba120250e94..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <meta name="referrer" content="unsafe-url">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via fetch-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/fetch-request/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/fetch-request/no-redirect/generic.http.html
deleted file mode 100644
index 46522686598..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/fetch-request/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <meta name="referrer" content="unsafe-url">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via fetch-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html
deleted file mode 100644
index 0c7c8484a4e..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <meta name="referrer" content="unsafe-url">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via fetch-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html
deleted file mode 100644
index d6b47ccbd36..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <meta name="referrer" content="unsafe-url">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via iframe-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html
deleted file mode 100644
index 96e137e4112..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/iframe-tag/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <meta name="referrer" content="unsafe-url">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via iframe-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html
deleted file mode 100644
index 06ba58084f3..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <meta name="referrer" content="unsafe-url">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via iframe-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html
deleted file mode 100644
index d54694fb1ed..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <meta name="referrer" content="unsafe-url">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via script-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/script-tag/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/script-tag/no-redirect/generic.http.html
deleted file mode 100644
index 6e1a080f9cb..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/script-tag/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <meta name="referrer" content="unsafe-url">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via script-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html
deleted file mode 100644
index 6343373d16a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <meta name="referrer" content="unsafe-url">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via script-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 5659e1f17fd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <meta name="referrer" content="unsafe-url">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via xhr-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/xhr-request/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/xhr-request/no-redirect/generic.http.html
deleted file mode 100644
index bf32a5b6b59..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/xhr-request/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <meta name="referrer" content="unsafe-url">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via xhr-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html
deleted file mode 100644
index 59919b70ecd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <meta name="referrer" content="unsafe-url">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via xhr-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 4a337036964..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <meta name="referrer" content="unsafe-url">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via fetch-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/fetch-request/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/fetch-request/no-redirect/generic.http.html
deleted file mode 100644
index d767da3fd7b..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/fetch-request/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <meta name="referrer" content="unsafe-url">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via fetch-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html
deleted file mode 100644
index a119bd26f51..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <meta name="referrer" content="unsafe-url">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via fetch-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 9045c6f9877..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <meta name="referrer" content="unsafe-url">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via iframe-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html
deleted file mode 100644
index 79164f38d4f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/iframe-tag/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <meta name="referrer" content="unsafe-url">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via iframe-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html
deleted file mode 100644
index dabf50d51c6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <meta name="referrer" content="unsafe-url">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via iframe-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 6df7de3ecdb..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <meta name="referrer" content="unsafe-url">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via script-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/script-tag/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/script-tag/no-redirect/generic.http.html
deleted file mode 100644
index 88c6a0f7aba..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/script-tag/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <meta name="referrer" content="unsafe-url">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via script-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html
deleted file mode 100644
index df434df7ab1..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <meta name="referrer" content="unsafe-url">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via script-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 2a264a4b107..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <meta name="referrer" content="unsafe-url">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via xhr-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/xhr-request/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/xhr-request/no-redirect/generic.http.html
deleted file mode 100644
index a6775759e6a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/xhr-request/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <meta name="referrer" content="unsafe-url">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via xhr-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html
deleted file mode 100644
index 91e3cd52054..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <meta name="referrer" content="unsafe-url">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via xhr-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html
deleted file mode 100644
index cbf5e1c28ff..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/fetch-request/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <meta name="referrer" content="unsafe-url">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via fetch-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/fetch-request/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/fetch-request/no-redirect/generic.http.html
deleted file mode 100644
index f2035473523..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/fetch-request/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <meta name="referrer" content="unsafe-url">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via fetch-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html
deleted file mode 100644
index f1837a8f7bb..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/fetch-request/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <meta name="referrer" content="unsafe-url">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via fetch-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 3882bfd35d9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <meta name="referrer" content="unsafe-url">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via iframe-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/iframe-tag/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/iframe-tag/no-redirect/generic.http.html
deleted file mode 100644
index 698f9f64c05..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/iframe-tag/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <meta name="referrer" content="unsafe-url">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via iframe-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html
deleted file mode 100644
index 5e6177d1728..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <meta name="referrer" content="unsafe-url">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via iframe-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/module-worker/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/module-worker/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 621ac5bb3e5..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/module-worker/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <meta name="referrer" content="unsafe-url">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via module-worker using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "module-worker",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/module-worker/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/module-worker/no-redirect/generic.http.html
deleted file mode 100644
index 8711a507ab5..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/module-worker/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <meta name="referrer" content="unsafe-url">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via module-worker using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "module-worker",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 81294f80501..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/script-tag/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <meta name="referrer" content="unsafe-url">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via script-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/script-tag/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/script-tag/no-redirect/generic.http.html
deleted file mode 100644
index d0b1553b75a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/script-tag/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <meta name="referrer" content="unsafe-url">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via script-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html
deleted file mode 100644
index 1d5ef969999..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/script-tag/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <meta name="referrer" content="unsafe-url">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via script-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/shared-worker/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/shared-worker/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 2e732e6567c..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/shared-worker/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <meta name="referrer" content="unsafe-url">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via shared-worker using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "shared-worker",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/shared-worker/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/shared-worker/no-redirect/generic.http.html
deleted file mode 100644
index 2529091d31c..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/shared-worker/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <meta name="referrer" content="unsafe-url">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via shared-worker using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "shared-worker",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/worker-request/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/worker-request/keep-origin-redirect/generic.http.html
deleted file mode 100644
index ab2c0a35831..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/worker-request/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <meta name="referrer" content="unsafe-url">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via worker-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "worker-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/worker-request/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/worker-request/no-redirect/generic.http.html
deleted file mode 100644
index 56668b94ca1..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/worker-request/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <meta name="referrer" content="unsafe-url">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via worker-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "worker-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html
deleted file mode 100644
index f2593530884..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/xhr-request/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <meta name="referrer" content="unsafe-url">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via xhr-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/xhr-request/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/xhr-request/no-redirect/generic.http.html
deleted file mode 100644
index b5c7283668c..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/xhr-request/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <meta name="referrer" content="unsafe-url">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via xhr-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html
deleted file mode 100644
index d4af8f3c3bb..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/xhr-request/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <meta name="referrer" content="unsafe-url">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via xhr-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html
deleted file mode 100644
index f501512aaf3..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <meta name="referrer" content="unsafe-url">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via fetch-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/fetch-request/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/fetch-request/no-redirect/generic.http.html
deleted file mode 100644
index d76e3c62c56..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/fetch-request/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <meta name="referrer" content="unsafe-url">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via fetch-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html
deleted file mode 100644
index 7f50fdbe077..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <meta name="referrer" content="unsafe-url">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via fetch-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 529b4b30658..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <meta name="referrer" content="unsafe-url">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via iframe-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/generic.http.html
deleted file mode 100644
index 340e5d55d5c..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <meta name="referrer" content="unsafe-url">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via iframe-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html
deleted file mode 100644
index 709d209649b..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <meta name="referrer" content="unsafe-url">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via iframe-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 3b744a333ca..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <meta name="referrer" content="unsafe-url">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via script-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/script-tag/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/script-tag/no-redirect/generic.http.html
deleted file mode 100644
index 00c704c6e38..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/script-tag/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <meta name="referrer" content="unsafe-url">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via script-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html
deleted file mode 100644
index e35b0a640e3..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <meta name="referrer" content="unsafe-url">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via script-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html
deleted file mode 100644
index 19f9faed619..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <meta name="referrer" content="unsafe-url">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via xhr-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/xhr-request/no-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/xhr-request/no-redirect/generic.http.html
deleted file mode 100644
index 42b8a17f079..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/xhr-request/no-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <meta name="referrer" content="unsafe-url">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via xhr-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html b/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html
deleted file mode 100644
index 50ab0a6eaeb..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/generic.http.html
+++ /dev/null
@@ -1,39 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
- <meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
- <meta name="referrer" content="unsafe-url">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via xhr-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "unsafe-url",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index 14a6eeb2bc6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via a-tag using the attr-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "attr-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "a-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 92c65585c59..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via iframe-tag using the attr-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "attr-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index ede753c5361..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via iframe-tag using the attr-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "attr-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index b1f6e1dc1dd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via iframe-tag using the attr-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "attr-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index b69090ff2b9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via img-tag using the attr-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "attr-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index a5bda07fa17..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via img-tag using the attr-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "attr-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index c61e9dfe6f1..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via img-tag using the attr-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "attr-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index d7a06eae0dd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via script-tag using the attr-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "attr-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index bd9d445ddc7..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via script-tag using the attr-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "attr-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 4bcfe741384..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via script-tag using the attr-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "attr-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 2f55f3f4bf3..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via a-tag using the attr-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "attr-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "a-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index fcdb3014ef7..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via iframe-tag using the attr-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "attr-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index f6fc0deec71..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via iframe-tag using the attr-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "attr-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 90db32e3818..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via iframe-tag using the attr-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "attr-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 22605533552..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via img-tag using the attr-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "attr-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 83d37336587..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via img-tag using the attr-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "attr-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 269dd5ab815..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via img-tag using the attr-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "attr-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 5367d9e882e..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via script-tag using the attr-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "attr-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 999d68c277f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via script-tag using the attr-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "attr-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 6e57d20ba55..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via script-tag using the attr-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "attr-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index b5e3d6c80a3..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/a-tag/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via a-tag using the attr-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "attr-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "a-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 35dc6568c3a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via iframe-tag using the attr-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "attr-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index cc38b182da7..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via iframe-tag using the attr-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "attr-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index dc3f4cf1e5e..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via iframe-tag using the attr-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "attr-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index e5c1855fde4..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via img-tag using the attr-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "attr-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index 4724f670f98..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via img-tag using the attr-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "attr-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 74f9f0e8a74..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via img-tag using the attr-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "attr-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 15a6abbf5ca..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via script-tag using the attr-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "attr-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index d8f487a90ef..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via script-tag using the attr-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "attr-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 14d4f5fb06b..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via script-tag using the attr-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "attr-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 3e02f034fec..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/a-tag/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via a-tag using the attr-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "attr-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "a-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 3f20abbb40e..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via iframe-tag using the attr-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "attr-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index e594604429f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via iframe-tag using the attr-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "attr-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 3e0dcd40d3d..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via iframe-tag using the attr-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "attr-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index ef5a7e6c88b..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via img-tag using the attr-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "attr-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index a50da9cb0cc..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via img-tag using the attr-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "attr-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 4a01a41549b..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via img-tag using the attr-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "attr-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 0a66eea4641..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via script-tag using the attr-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "attr-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 5984794f2a0..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via script-tag using the attr-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "attr-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 0c02a2ead89..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via script-tag using the attr-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "attr-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index c656d41de40..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via fetch-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index 874e3cb3bed..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via fetch-request using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 9d54a271872..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via fetch-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 43015a873cf..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via iframe-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index ed58d7bd11b..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via iframe-tag using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index c5114ecd89c..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via iframe-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 34f650da7f4..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via img-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index 1e668ae6d8b..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via img-tag using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 19d80342987..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via img-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 705411d518c..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via script-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index 99c1bc56a43..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via script-tag using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 607b4c29e80..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via script-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 1bc364522cd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via xhr-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index ca8adad1243..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via xhr-request using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index b04ed3354dd..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via xhr-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index a06130ce4a4..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via fetch-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index fbdaf4b0557..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via fetch-request using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 4fd95a894c4..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via fetch-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 1f65303cd10..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via iframe-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 4b70a9afd13..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via iframe-tag using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index f3c586e12e2..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via iframe-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 9bcb05db1fe..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via img-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 7b48d72c92e..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via img-tag using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 5b539644181..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via img-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 841b54b5843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via script-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index ae3939410a8..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via script-tag using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 4e7d7c9b988..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via script-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index f48a201bbb0..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via xhr-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 111fa37e95e..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via xhr-request using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index d1cc1faef43..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via xhr-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index bcd5661d9c0..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via fetch-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index a637f732ea0..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via fetch-request using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 18e29ee1fc6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via fetch-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 14ce35bd1eb..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via iframe-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index e9b5f75f9cc..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via iframe-tag using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 392c5783558..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via iframe-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 58977c3e7b4..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/img-tag/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via img-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index 59cc2bda485..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/img-tag/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via img-tag using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 67625838e8d..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/img-tag/swap-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via img-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 45d7f1e9169..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/module-worker/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via module-worker using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "module-worker",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/module-worker/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/module-worker/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index 7d495b43c57..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/module-worker/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via module-worker using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "module-worker",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index afd29bcd69b..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via script-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index e12c41d3b65..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via script-tag using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index e4499893714..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via script-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 7544a66b826..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/shared-worker/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via shared-worker using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "shared-worker",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/shared-worker/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/shared-worker/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index 6c1bf133745..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/shared-worker/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via shared-worker using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "shared-worker",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index e6424cdf933..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/worker-request/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via worker-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "worker-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/worker-request/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/worker-request/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index 284af1c6860..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/worker-request/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via worker-request using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "worker-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 8c7f2bd5d37..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via xhr-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index 5ba5152bc2b..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via xhr-request using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index fcf8844e900..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via xhr-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 26b14d73149..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via fetch-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index c632fa8e783..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via fetch-request using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 4590df6a015..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via fetch-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index cbe8df3c410..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via iframe-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 69e5b6b483c..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via iframe-tag using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 177bdd6c772..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via iframe-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index abe6ef4500c..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via img-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 15fb33654e5..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/img-tag/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via img-tag using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 0d52c78f4a9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via img-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index ef9db2cbca1..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via script-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 02678004f51..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via script-tag using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index c391b257a81..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via script-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 03c4677086d..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via xhr-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 60a0f6ebcb3..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via xhr-request using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index d1745b41235..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via xhr-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 33df9910306..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via fetch-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index d11c4a1897b..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via fetch-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 2bf06bb2110..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via fetch-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 2bcca81084c..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via iframe-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index e4b835d8644..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via iframe-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 20590be9e24..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via iframe-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 8bf8bd05ff1..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via script-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index 8d330b11bca..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via script-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index fe3e977d000..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via script-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 4db7894a80f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via xhr-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index 8bb522349b0..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via xhr-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index db792b5164a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via xhr-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 8cdf6d70efa..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via fetch-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 9a41ab1b006..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via fetch-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 581efdb75d7..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via fetch-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index f2c77dcd96c..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via iframe-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 8db2725b16b..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via iframe-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 11baca87b24..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via iframe-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index e349d5686ff..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via script-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 500d47a1c95..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via script-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 21549ca927e..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via script-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index ca7d40ed2f6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via xhr-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index fdc8bbef59d..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via xhr-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index e6518c9e479..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via xhr-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 220b5aa320d..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/fetch-request/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via fetch-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index f0b4658aec6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/fetch-request/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via fetch-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 4cfd819a473..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/fetch-request/swap-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via fetch-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 4ea3fe52684..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/iframe-tag/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via iframe-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index 0978fb710d6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/iframe-tag/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via iframe-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 7a4fe02b9b7..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/iframe-tag/swap-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via iframe-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/module-worker/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/module-worker/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 21065a0f8b5..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/module-worker/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via module-worker using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "module-worker",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/module-worker/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/module-worker/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index 21b9d284bfa..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/module-worker/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via module-worker using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "module-worker",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 6911528c08d..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/script-tag/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via script-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index cf7d1dd9c27..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/script-tag/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via script-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 21882b16a44..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/script-tag/swap-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via script-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/shared-worker/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/shared-worker/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 0028373a419..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/shared-worker/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via shared-worker using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "shared-worker",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/shared-worker/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/shared-worker/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index 17eff823084..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/shared-worker/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via shared-worker using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "shared-worker",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/worker-request/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/worker-request/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index dfff2a541dc..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/worker-request/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via worker-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "worker-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/worker-request/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/worker-request/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index 3c7cea5bca0..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/worker-request/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via worker-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "worker-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 96971a833e3..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/xhr-request/keep-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via xhr-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html
deleted file mode 100644
index c98fa10e571..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/xhr-request/no-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via xhr-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html
deleted file mode 100644
index 4fe678652d0..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/xhr-request/swap-origin-redirect/insecure-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via xhr-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index c2e04ad3614..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via fetch-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 1aaa67c96d1..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/fetch-request/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via fetch-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 7af45bc8865..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via fetch-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 054b2eb241a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via iframe-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index faf51f1e759..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via iframe-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index a9141695795..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via iframe-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 53cdc7edf00..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via script-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 406ef5dff60..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/script-tag/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via script-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 993c9ea86b1..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via script-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index d88b4994e32..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via xhr-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html
deleted file mode 100644
index e5a4240f5a4..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/xhr-request/no-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via xhr-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html b/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html
deleted file mode 100644
index 834e2ef0101..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/upgrade-protocol.http.html
+++ /dev/null
@@ -1,38 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is not explicitly defined</title>
- <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an https
- sub-resource via xhr-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <script src="/common/security-features/resources/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": null,
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/resources/chromium/webxr-test.js b/tests/wpt/web-platform-tests/resources/chromium/webxr-test.js
index b52ee3bf325..73dda0920f1 100644
--- a/tests/wpt/web-platform-tests/resources/chromium/webxr-test.js
+++ b/tests/wpt/web-platform-tests/resources/chromium/webxr-test.js
@@ -45,6 +45,15 @@ function getMatrixFromTransform(transform) {
m14, m24, m34, 1];
}
+function getGFXTransformFromPosition(x, y, z) {
+ let transform = new gfx.mojom.Transform();
+ transform.matrix = getMatrixFromTransform({
+ position: [x, y, z],
+ orientation: [0, 0, 0, 1]
+ });
+ return transform;
+}
+
class ChromeXRTest {
constructor() {
this.mockVRService_ = new MockVRService(mojo.frameInterfaces);
@@ -369,7 +378,7 @@ class MockRuntime {
leftDegrees: 50.899,
rightDegrees: 35.197
},
- offset: { x: -0.032, y: 0, z: 0 },
+ headFromEye: getGFXTransformFromPosition(-0.032, 0, 0),
renderWidth: 20,
renderHeight: 20
},
@@ -380,7 +389,7 @@ class MockRuntime {
leftDegrees: 50.899,
rightDegrees: 35.197
},
- offset: { x: 0.032, y: 0, z: 0 },
+ headFromEye: getGFXTransformFromPosition(0.032, 0, 0),
renderWidth: 20,
renderHeight: 20
},
@@ -415,7 +424,7 @@ class MockRuntime {
leftDegrees: toDegrees(leftTan),
rightDegrees: toDegrees(rightTan)
},
- offset: { x: offset[0], y: offset[1], z: offset[2] },
+ headFromEye: getGFXTransformFromPosition(offset[0], offset[1], offset[2]),
renderWidth: fakeXRViewInit.resolution.width,
renderHeight: fakeXRViewInit.resolution.height
};
diff --git a/tests/wpt/web-platform-tests/service-workers/service-worker/activation.https.html b/tests/wpt/web-platform-tests/service-workers/service-worker/activation.https.html
index 5755758e571..007ecaad76c 100644
--- a/tests/wpt/web-platform-tests/service-workers/service-worker/activation.https.html
+++ b/tests/wpt/web-platform-tests/service-workers/service-worker/activation.https.html
@@ -113,10 +113,12 @@ promise_test(t => {
var scope = 'resources/skip-waiting';
var worker_url = 'resources/mint-new-worker.py?skip-waiting';
var registration;
+ var iframe;
var new_worker;
return setup_activation_test(t, scope, worker_url)
.then(result => {
registration = result.registration;
+ iframe = result.iframe;
// Finish the request. The iframe does not need to be removed because
// skipWaiting() was called.
new_worker = registration.waiting;
@@ -126,6 +128,8 @@ promise_test(t => {
})
.then(() => {
assert_equals(registration.active, new_worker);
+ // Remove the iframe.
+ iframe.remove();
});
}, 'skipWaiting bypasses no controllee requirement');
diff --git a/tests/wpt/web-platform-tests/service-workers/service-worker/detached-context.https.html b/tests/wpt/web-platform-tests/service-workers/service-worker/detached-context.https.html
index 5ae4de8cc81..f96370d2010 100644
--- a/tests/wpt/web-platform-tests/service-workers/service-worker/detached-context.https.html
+++ b/tests/wpt/web-platform-tests/service-workers/service-worker/detached-context.https.html
@@ -59,6 +59,7 @@ promise_test(t => {
.then(() => {
assert_equals(resolvedCount, 0,
'methods called on a detached registration should not resolve');
+ frame.remove();
})
}, 'accessing a ServiceWorkerRegistration from a removed iframe');
@@ -102,6 +103,7 @@ promise_test(t => {
assert_equals(
get_navigator().serviceWorker,
iframe.contentWindow.navigator.serviceWorker);
+ iframe.remove();
});
}, 'accessing navigator.serviceWorker on a detached iframe');
diff --git a/tests/wpt/web-platform-tests/sms/interceptor.https.html b/tests/wpt/web-platform-tests/sms/interceptor.https.html
index 86b21922284..39b749b6d32 100644
--- a/tests/wpt/web-platform-tests/sms/interceptor.https.html
+++ b/tests/wpt/web-platform-tests/sms/interceptor.https.html
@@ -12,7 +12,7 @@
1) Include <script src="./sms_provider.js"></script> in your test.
2) Set expectations
- await expect(receive).andReturn((timeout) => {
+ await expect(receive).andReturn(() => {
// mock behavior
})
3) Call navigator.sms.receive()
@@ -34,7 +34,7 @@
'use strict';
promise_test(async t => {
- await expect(receive).andReturn((timeout) => {
+ await expect(receive).andReturn(() => {
return Promise.resolve({
status: Status.kSuccess,
message: "hello",
@@ -47,13 +47,13 @@ promise_test(async t => {
}, 'Basic usage');
promise_test(async t => {
- await expect(receive).andReturn((timeout) => {
+ await expect(receive).andReturn(() => {
return Promise.resolve({
status: Status.kSuccess,
message: "hello1",
});
});
- await expect(receive).andReturn((timeout) => {
+ await expect(receive).andReturn(() => {
return Promise.resolve({
status: Status.kSuccess,
message: "hello2",
@@ -71,103 +71,35 @@ promise_test(async t => {
}, 'Handle multiple requests in different order.');
promise_test(async t => {
- await expect(receive).andReturn((timeout) => {
+ await expect(receive).andReturn(() => {
return Promise.resolve({
- status: Status.kTimeout,
+ status: Status.kCancelled,
});
});
- await expect(receive).andReturn((timeout) => {
+ await expect(receive).andReturn(() => {
return Promise.resolve({
status: Status.kSuccess,
message: "success",
});
});
- let timeout_sms = navigator.sms.receive();
+ let cancelled_sms = navigator.sms.receive();
let successful_sms = navigator.sms.receive();
let successful_msg = await successful_sms;
assert_equals(successful_msg.content, "success");
try {
- await timeout_sms;
- assert_unreached('Expected TimeoutError to be thrown.');
+ await cancelled_sms;
+ assert_unreached('Expected AbortError to be thrown.');
} catch (error) {
- assert_equals(error.name, "TimeoutError");
- assert_equals(error.message, "SMSReceiver timed out.");
+ assert_equals(error.name, "AbortError");
+ assert_equals(error.message, "SMSReceiver was aborted.");
}
}, 'Handle multiple requests with success and error.');
promise_test(async t => {
- await expect(receive).andReturn((timeout) => {
- return Promise.resolve({
- status: Status.kTimeout,
- });
- });
-
- try {
- await navigator.sms.receive();
- assert_unreached('Expected TimeoutError to be thrown.');
- } catch (error) {
- assert_equals(error.name, "TimeoutError");
- assert_equals(error.message, "SMSReceiver timed out.");
- }
-}, 'Deal with timeouts');
-
-promise_test(async t => {
- try {
- await navigator.sms.receive({timeout: 0});
- assert_unreached('Expected NotSupportedError to be thrown.');
- } catch (error) {
- assert_equals(error.name, "NotSupportedError");
- assert_equals(error.message, "Invalid timeout.");
- }
-}, 'Should throw error with invalid timeout (0)');
-
-promise_test(async t => {
- try {
- await navigator.sms.receive({timeout: null});
- assert_unreached('Expected NotSupportedError to be thrown.');
- } catch (error) {
- assert_equals(error.name, "NotSupportedError");
- assert_equals(error.message, "Invalid timeout.");
- }
-}, 'Should throw error with invalid timeout (null)');
-
-promise_test(async t => {
- try {
- await navigator.sms.receive({timeout: -1});
- assert_unreached('Expected NotSupportedError to be thrown.');
- } catch (error) {
- assert_equals(error.name, "NotSupportedError");
- assert_equals(error.message, "Invalid timeout.");
- }
-}, 'Should throw error with invalid timeout (-1)');
-
-promise_test(async t => {
- try {
- await navigator.sms.receive({timeout: NaN});
- assert_unreached('Expected NotSupportedError to be thrown.');
- } catch (error) {
- assert_equals(error.name, "NotSupportedError");
- assert_equals(error.message, "Invalid timeout.");
- }
-}, 'Should throw error with invalid timeout (NaN)');
-
-promise_test(async t => {
- await expect(receive).andReturn((timeout) => {
- return Promise.resolve({
- status: Status.kSuccess,
- message: "hello",
- });
- });
-
- let sms = await navigator.sms.receive({timeout: undefined});
- assert_equals(sms.content, "hello");
-}, 'Should use default value for timeout (undefined)');
-
-promise_test(async t => {
- await expect(receive).andReturn((timeout) => {
+ await expect(receive).andReturn(() => {
return Promise.resolve({
status: Status.kCancelled,
});
diff --git a/tests/wpt/web-platform-tests/sms/sms_provider.js b/tests/wpt/web-platform-tests/sms/sms_provider.js
index 4506135551c..11fd8466e98 100644
--- a/tests/wpt/web-platform-tests/sms/sms_provider.js
+++ b/tests/wpt/web-platform-tests/sms/sms_provider.js
@@ -36,16 +36,16 @@ class FakeSmsReceiverImpl {
return this;
}
- receive(timeout) {
+ receive() {
let call = this.returnValues.receive.shift();
if (!call) {
throw new Error("Unexpected call.");
}
- return call(timeout);
+ return call();
}
}
-function receive(timeout, callback) {
+function receive(callback) {
throw new Error("expected to be overriden by tests");
}
diff --git a/tests/wpt/web-platform-tests/sms/sms_receiver.idl b/tests/wpt/web-platform-tests/sms/sms_receiver.idl
index b71b6a3e0db..64048523f90 100644
--- a/tests/wpt/web-platform-tests/sms/sms_receiver.idl
+++ b/tests/wpt/web-platform-tests/sms/sms_receiver.idl
@@ -13,7 +13,7 @@ interface SMS {
};
dictionary SMSReceiverOptions {
- unsigned long timeout;
+ // TODO(b/976401): Implement abort controller.
};
[
diff --git a/tests/wpt/web-platform-tests/svg/animations/beginelement-instance-time-1.html b/tests/wpt/web-platform-tests/svg/animations/beginelement-instance-time-1.html
new file mode 100644
index 00000000000..aa1cb8c983d
--- /dev/null
+++ b/tests/wpt/web-platform-tests/svg/animations/beginelement-instance-time-1.html
@@ -0,0 +1,28 @@
+<!DOCTYPE html>
+<title>beginElement() timing</title>
+<script src="/resources/testharness.js"></script>
+<script src="/resources/testharnessreport.js"></script>
+<svg width="100" height="20" style="border: grey 1px solid">
+ <rect width="1" height="20">
+ <animateMotion path="M0,0h100" dur="100ms"/>
+ </rect>
+</svg>
+<script>
+ async_test(t => {
+ const svg = document.querySelector('svg');
+ const motion = document.querySelector('animateMotion');
+ motion.addEventListener('endEvent', t.step_func(() => {
+ t.step_timeout(t.step_func(() => {
+ motion.beginElement();
+ let start = svg.getCurrentTime();
+ requestAnimationFrame(t.step_func_done(() => {
+ svg.pauseAnimations();
+ let elapsed = svg.getCurrentTime() - start;
+ let expected_pos = Math.min(elapsed * 1000, 100);
+ let actual_pos = motion.parentElement.getCTM().e;
+ assert_approx_equals(actual_pos, expected_pos, 2, `position after ${elapsed}`);
+ }));
+ }), 50);
+ }), { once: true });
+ });
+</script>
diff --git a/tests/wpt/web-platform-tests/svg/extensibility/foreignObject/masked-ref.html b/tests/wpt/web-platform-tests/svg/extensibility/foreignObject/masked-ref.html
new file mode 100644
index 00000000000..1a3b13c9451
--- /dev/null
+++ b/tests/wpt/web-platform-tests/svg/extensibility/foreignObject/masked-ref.html
@@ -0,0 +1,2 @@
+<!doctype HTML>
+<div style="width: 32px; height: 32px; background: green; overflow: hidden; border-radius: 50%"></div>
diff --git a/tests/wpt/web-platform-tests/svg/extensibility/foreignObject/masked.html b/tests/wpt/web-platform-tests/svg/extensibility/foreignObject/masked.html
new file mode 100644
index 00000000000..ad18e8931aa
--- /dev/null
+++ b/tests/wpt/web-platform-tests/svg/extensibility/foreignObject/masked.html
@@ -0,0 +1,13 @@
+<!doctype HTML>
+<title>Tests that an SVG mask applies to a foreignObject element</title>
+<link rel="match" href="masked-ref.html">
+<link rel="author" title="Chris Harrelson" href="mailto:chrishtr@chromium.org">
+<link rel="help" href="https://svgwg.org/svg2-draft/single-page.html#embedded-ForeignObjectElement"/>
+<svg style="display: block">
+ <foreignObject x="0" y="0" width="32" height="32" mask="url(#circle)">
+ <div style="width: 32px; height: 32px; background: green"></div>
+ </foreignObject>
+ <mask id="circle" maskContentUnits="objectBoundingBox" viewBox="0 0 1 1">
+ <circle fill="white" cx="0.5" cy="0.5" r="0.5"></circle>
+ </mask>
+</svg>
diff --git a/tests/wpt/web-platform-tests/svg/struct/scripted/autofocus-attribute.svg b/tests/wpt/web-platform-tests/svg/struct/scripted/autofocus-attribute.svg
index 6c095a4bef5..d8f25741ee4 100644
--- a/tests/wpt/web-platform-tests/svg/struct/scripted/autofocus-attribute.svg
+++ b/tests/wpt/web-platform-tests/svg/struct/scripted/autofocus-attribute.svg
@@ -19,7 +19,7 @@ promise_test(async t => {
svgA.setAttribute('href', '#');
svgA.setAttribute('autofocus', 'autofocus');
w.document.documentElement.appendChild(svgA);
- await waitUntilStableAutofocusState(t);
+ await waitUntilStableAutofocusState(w);
assert_equals(w.document.activeElement, svgA);
}, '<a> should support autofocus');
@@ -32,7 +32,7 @@ promise_test(async t => {
path.setAttribute('tabindex', '0');
path.setAttribute('autofocus', 'autofocus');
w.document.documentElement.appendChild(path);
- await waitUntilStableAutofocusState(t);
+ await waitUntilStableAutofocusState(w);
assert_equals(w.document.activeElement, path);
}, 'Renderable element with tabindex should support autofocus');
@@ -44,7 +44,7 @@ promise_test(async t => {
element.setAttribute('tabindex', '0');
element.setAttribute('autofocus', 'autofocus');
w.document.documentElement.appendChild(element);
- await waitUntilStableAutofocusState(t);
+ await waitUntilStableAutofocusState(w);
// https://html.spec.whatwg.org/C/#dom-documentorshadowroot-activeelement
// 6. If candidate's document element is non-null, then return that document
// element.
diff --git a/tests/wpt/web-platform-tests/tools/wpt/tests/test_wpt.py b/tests/wpt/web-platform-tests/tools/wpt/tests/test_wpt.py
index 04c0723aacb..a2498333c2b 100644
--- a/tests/wpt/web-platform-tests/tools/wpt/tests/test_wpt.py
+++ b/tests/wpt/web-platform-tests/tools/wpt/tests/test_wpt.py
@@ -359,15 +359,15 @@ def test_tests_affected_null(capsys, manifest_dir):
# the current working directory for references to the changed files, not the ones at
# that specific commit. But we can at least test it returns something sensible.
# The test will fail if the file we assert is renamed, so we choose a stable one.
- commit = "9bf1daa3d8b4425f2354c3ca92c4cf0398d329dd"
+ commit = "2614e3316f1d3d1a744ed3af088d19516552a5de"
with pytest.raises(SystemExit) as excinfo:
wpt.main(argv=["tests-affected", "--null", "--metadata", manifest_dir, "%s~..%s" % (commit, commit)])
assert excinfo.value.code == 0
out, err = capsys.readouterr()
tests = out.split("\0")
- assert "dom/interfaces.html" in tests
- assert "html/dom/interfaces.https.html" in tests
+ assert "dom/idlharness.any.js" in tests
+ assert "xhr/idlharness.any.js" in tests
@pytest.mark.slow
diff --git a/tests/wpt/web-platform-tests/trusted-types/block-eval.tentative.html b/tests/wpt/web-platform-tests/trusted-types/block-eval.tentative.html
index e1a6a69accd..cd4f5827c53 100644
--- a/tests/wpt/web-platform-tests/trusted-types/block-eval.tentative.html
+++ b/tests/wpt/web-platform-tests/trusted-types/block-eval.tentative.html
@@ -12,19 +12,19 @@
<script nonce="abc">
let p = createScript_policy(window, 1);
test(t => {
+ let a = 0;
assert_throws(new EvalError(), _ => {
- eval('"hello there"') });
- }, "eval with plain string throws.");
+ eval('a="hello there"')
+ });
+ assert_equals(a, 0);
+ }, "eval with plain string throws (both block).");
test(t => {
- let s = eval(p.createScript('"Hello transformed string"'));
- assert_equals(s, "Hello a cat string");
- }, "eval with TrustedScript works.");
-
- TrustedTypes.createPolicy("default", { createScript: createScriptJS }, true);
- test(t => {
- let s = eval('"Hello transformed untrusted string"');
- assert_equals(s, "Hello a cat untrusted string");
- }, "eval obeys default policy.");
+ let a = 0;
+ assert_throws(new EvalError(), _ => {
+ eval(p.createScript('a="Hello transformed string"'));
+ });
+ assert_equals(a, 0);
+ }, "eval with TrustedScript throws (script-src blocks).");
</script>
diff --git a/tests/wpt/web-platform-tests/trusted-types/eval-with-permissive-csp.tentative.html b/tests/wpt/web-platform-tests/trusted-types/eval-with-permissive-csp.tentative.html
index 68d119a5201..25b4948c039 100644
--- a/tests/wpt/web-platform-tests/trusted-types/eval-with-permissive-csp.tentative.html
+++ b/tests/wpt/web-platform-tests/trusted-types/eval-with-permissive-csp.tentative.html
@@ -13,9 +13,12 @@
<script nonce="abc">
let p = createScript_policy(window, 1);
test(t => {
- let s = eval('"hello there"');
- assert_equals(s, "hello there");
- }, "eval with plain string with Trusted Types and permissive CSP works.");
+ let a = 0;
+ assert_throws(new EvalError(), _ => {
+ eval('a="hello there"');
+ });
+ assert_equals(a, 0);
+ }, "eval with plain string with Trusted Types and permissive CSP throws (no type).");
test(t => {
let s = eval(p.createScript('"Hello transformed string"'));
diff --git a/tests/wpt/web-platform-tests/trusted-types/trusted-types-eval-reporting-no-unsafe-eval.tentative.https.html b/tests/wpt/web-platform-tests/trusted-types/trusted-types-eval-reporting-no-unsafe-eval.tentative.https.html
new file mode 100644
index 00000000000..f60bb9fe514
--- /dev/null
+++ b/tests/wpt/web-platform-tests/trusted-types/trusted-types-eval-reporting-no-unsafe-eval.tentative.https.html
@@ -0,0 +1,115 @@
+<!DOCTYPE html>
+<head>
+ <script nonce="123" src="/resources/testharness.js"></script>
+ <script nonce="123"src="/resources/testharnessreport.js"></script>
+ <script nonce="123"src="/content-security-policy/support/testharness-helper.js"></script>
+</head>
+<body>
+ <script nonce="123">
+ // CSP insists the "trusted-types: ..." directives are deliverd as headers
+ // (rather than as "<meta http-equiv" tags). This test assumes the following
+ // headers are set in the .headers file:
+ //
+ // Content-Security-Policy: trusted-types *
+ // Content-Security-Policy: script-src 'unsafe-inline'; report-uri ...
+ // Content-Security-Policy: plugin-types bla/blubb
+ //
+ // The last rule is there so we can provoke a CSP violation report at will.
+ // The intent is that in order to test that a violation has *not* been thrown
+ // (and without resorting to abominations like timeouts), we force a *another*
+ // CSP violation (by violating the img-src rule) and when that event is
+ // processed we can we sure that an earlier event - if it indeed occurred -
+ // must have already been processed.
+
+ // Return function that returns a promise that resolves on the given
+ // violation report.
+ // how_many - how many violation events are expected.
+ // filter_arg - iff function, call it with the event object.
+ // Else, string-ify and compare against event.originalPolicy.
+ function promise_violation(filter_arg) {
+ return _ => new Promise((resolve, reject) => {
+ function handler(e) {
+ let matches = (filter_arg instanceof Function)
+ ? filter_arg(e)
+ : (e.originalPolicy.includes(filter_arg));
+ if (matches) {
+ document.removeEventListener("securitypolicyviolation", handler);
+ e.stopPropagation();
+ resolve(e);
+ }
+ }
+ document.addEventListener("securitypolicyviolation", handler);
+ });
+ }
+
+ // Like assert_throws, but we don't care about the exact error. We just want
+ // to run the code and continue.
+ function expect_throws(fn) {
+ try { fn(); assert_unreached(); } catch (err) { /* ignore */ }
+ }
+
+ // A sample policy we use to test TrustedTypes.createPolicy behaviour.
+ const id = x => x;
+ const a_policy = {
+ createHTML: id,
+ createScriptURL: id,
+ createURL: id,
+ createScript: id,
+ };
+
+ const scriptyPolicy = TrustedTypes.createPolicy('allowEval', a_policy);
+
+ // Provoke/wait for a CSP violation, in order to be sure that all previous
+ // CSP violations have been delivered.
+ function promise_flush() {
+ return promise_violation("plugin-types bla/blubb");
+ }
+ function flush() {
+ expect_throws(_ => {
+ var o = document.createElement('object');
+ o.type = "application/x-shockwave-flash";
+ document.body.appendChild(o);
+ });
+ }
+
+ window.script_run_beacon = 'never_overwritten';
+
+ promise_test(t => {
+ let p = Promise.resolve()
+ .then(promise_violation("trusted-types *"))
+ .then(promise_flush());
+ expect_throws(_ => eval('script_run_beacon="should not run"'));
+ assert_equals(script_run_beacon, 'never_overwritten');
+ flush();
+ return p;
+ }, "Trusted Type violation report: evaluating a string violates both script-src and trusted-types.");
+
+ promise_test(t => {
+ let p = Promise.resolve()
+ .then(promise_violation("script-src"))
+ .then(promise_flush());
+ expect_throws(_ => eval('script_run_beacon="should not run"'));
+ // TODO(ssanfilippo) This should throw, but doesn't yet. See crbug.com/992424.
+ eval(scriptyPolicy.createScript('script_run_beacon="i ran"'));
+ flush();
+ assert_not_equals(script_run_beacon, 'i ran'); // Code did not run.
+ return p;
+ }, "Trusted Type violation report: evaluating a Trusted Script violates script-src.");
+
+ promise_test(t => {
+ TrustedTypes.createPolicy('default', {
+ createScript: s => s.replace('payload', 'default policy'),
+ }, true);
+ let p = Promise.resolve()
+ .then(promise_violation((e) =>
+ e.effectiveDirective.includes('script-src') &&
+ e.sample.includes("default policy")))
+ .then(promise_flush());
+ expect_throws(_ => eval('script_run_beacon="payload"')); // script-src will block.
+ assert_not_equals(script_run_beacon, 'default policy'); // Code did not run.
+ flush();
+ return p;
+ }, "Trusted Type violation report: script-src restrictions apply after the default policy runs.");
+
+ </script>
+</body>
diff --git a/tests/wpt/web-platform-tests/trusted-types/trusted-types-eval-reporting-no-unsafe-eval.tentative.https.html.headers b/tests/wpt/web-platform-tests/trusted-types/trusted-types-eval-reporting-no-unsafe-eval.tentative.https.html.headers
new file mode 100644
index 00000000000..4bc0bd3c1ab
--- /dev/null
+++ b/tests/wpt/web-platform-tests/trusted-types/trusted-types-eval-reporting-no-unsafe-eval.tentative.https.html.headers
@@ -0,0 +1,4 @@
+Content-Security-Policy: trusted-types *
+Content-Security-Policy: script-src http: https: 'nonce-123' 'report-sample'
+Content-Security-Policy: plugin-types bla/blubb
+
diff --git a/tests/wpt/web-platform-tests/trusted-types/trusted-types-eval-reporting-report-only.tentative.https.html b/tests/wpt/web-platform-tests/trusted-types/trusted-types-eval-reporting-report-only.tentative.https.html
new file mode 100644
index 00000000000..1fb65459468
--- /dev/null
+++ b/tests/wpt/web-platform-tests/trusted-types/trusted-types-eval-reporting-report-only.tentative.https.html
@@ -0,0 +1,107 @@
+<!DOCTYPE html>
+<head>
+ <script nonce="123" src="/resources/testharness.js"></script>
+ <script nonce="123"src="/resources/testharnessreport.js"></script>
+ <script nonce="123"src="/content-security-policy/support/testharness-helper.js"></script>
+</head>
+<body>
+ <script nonce="123">
+ // CSP insists the "trusted-types: ..." directives are deliverd as headers
+ // (rather than as "<meta http-equiv" tags). This test assumes the following
+ // headers are set in the .headers file:
+ //
+ // Content-Security-Policy: trusted-types *
+ // Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval'; report-uri ...
+ // Content-Security-Policy: plugin-types bla/blubb
+ //
+ // The last rule is there so we can provoke a CSP violation report at will.
+ // The intent is that in order to test that a violation has *not* been thrown
+ // (and without resorting to abominations like timeouts), we force a *another*
+ // CSP violation (by violating the img-src rule) and when that event is
+ // processed we can we sure that an earlier event - if it indeed occurred -
+ // must have already been processed.
+
+ // Return function that returns a promise that resolves on the given
+ // violation report.
+ //
+ // filter_arg - iff function, call it with the event object.
+ // Else, string-ify and compare against event.originalPolicy.
+ function promise_violation(filter_arg) {
+ return _ => new Promise((resolve, reject) => {
+ function handler(e) {
+ let matches = (filter_arg instanceof Function)
+ ? filter_arg(e)
+ : (e.originalPolicy.includes(filter_arg));
+ if (matches) {
+ document.removeEventListener("securitypolicyviolation", handler);
+ e.stopPropagation();
+ resolve(e);
+ }
+ }
+ document.addEventListener("securitypolicyviolation", handler);
+ });
+ }
+
+ // Like assert_throws, but we don't care about the exact error. We just want
+ // to run the code and continue.
+ function expect_throws(fn) {
+ try { fn(); assert_unreached(); } catch (err) { /* ignore */ }
+ }
+
+ // A sample policy we use to test TrustedTypes.createPolicy behaviour.
+ const id = x => x;
+ const a_policy = {
+ createHTML: id,
+ createScriptURL: id,
+ createURL: id,
+ createScript: id,
+ };
+
+ const scriptyPolicy = TrustedTypes.createPolicy('allowEval', a_policy);
+
+ // Provoke/wait for a CSP violation, in order to be sure that all previous
+ // CSP violations have been delivered.
+ function promise_flush() {
+ return promise_violation("plugin-types bla/blubb");
+ }
+ function flush() {
+ expect_throws(_ => {
+ var o = document.createElement('object');
+ o.type = "application/x-shockwave-flash";
+ document.body.appendChild(o);
+ });
+ }
+
+ window.script_run_beacon = 'vanilla';
+
+ promise_test(t => {
+ let p = Promise.resolve()
+ .then(promise_violation("trusted-types *"))
+ .then(promise_flush());
+ eval('script_run_beacon="report-only-does-not-stop"');
+ assert_equals(script_run_beacon, 'report-only-does-not-stop');
+ flush();
+ return p;
+ }, "Trusted Type violation report: evaluating a string.");
+
+ promise_test(t => {
+ let p = promise_flush()();
+ eval(scriptyPolicy.createScript('script_run_beacon="trusted-script-ok"'));
+ flush();
+ assert_equals(script_run_beacon, 'trusted-script-ok');
+ return p;
+ }, "Trusted Type violation report: evaluating a Trusted Script.");
+
+ promise_test(t => {
+ TrustedTypes.createPolicy('default', {
+ createScript: s => s.replace('payload', 'default policy'),
+ }, true);
+ let p = promise_flush()();
+ eval('script_run_beacon="payload"');
+ assert_equals(script_run_beacon, 'default policy');
+ flush();
+ return p;
+ }, "Trusted Type violation report: default policy runs in report-only mode.");
+
+ </script>
+</body>
diff --git a/tests/wpt/web-platform-tests/trusted-types/trusted-types-eval-reporting-report-only.tentative.https.html.headers b/tests/wpt/web-platform-tests/trusted-types/trusted-types-eval-reporting-report-only.tentative.https.html.headers
new file mode 100644
index 00000000000..ba26c77fbf4
--- /dev/null
+++ b/tests/wpt/web-platform-tests/trusted-types/trusted-types-eval-reporting-report-only.tentative.https.html.headers
@@ -0,0 +1,4 @@
+Content-Security-Policy-Report-Only: trusted-types *
+Content-Security-Policy: script-src http: https: 'nonce-123' 'unsafe-eval'
+Content-Security-Policy: plugin-types bla/blubb
+
diff --git a/tests/wpt/web-platform-tests/trusted-types/trusted-types-eval-reporting.tentative.https.html b/tests/wpt/web-platform-tests/trusted-types/trusted-types-eval-reporting.tentative.https.html
new file mode 100644
index 00000000000..309873cb1f8
--- /dev/null
+++ b/tests/wpt/web-platform-tests/trusted-types/trusted-types-eval-reporting.tentative.https.html
@@ -0,0 +1,107 @@
+<!DOCTYPE html>
+<head>
+ <script nonce="123" src="/resources/testharness.js"></script>
+ <script nonce="123"src="/resources/testharnessreport.js"></script>
+ <script nonce="123"src="/content-security-policy/support/testharness-helper.js"></script>
+</head>
+<body>
+ <script nonce="123">
+ // CSP insists the "trusted-types: ..." directives are deliverd as headers
+ // (rather than as "<meta http-equiv" tags). This test assumes the following
+ // headers are set in the .headers file:
+ //
+ // Content-Security-Policy: trusted-types *
+ // Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval'; report-uri ...
+ // Content-Security-Policy: plugin-types bla/blubb
+ //
+ // The last rule is there so we can provoke a CSP violation report at will.
+ // The intent is that in order to test that a violation has *not* been thrown
+ // (and without resorting to abominations like timeouts), we force a *another*
+ // CSP violation (by violating the img-src rule) and when that event is
+ // processed we can we sure that an earlier event - if it indeed occurred -
+ // must have already been processed.
+
+ // Return function that returns a promise that resolves on the given
+ // violation report.
+ //
+ // filter_arg - iff function, call it with the event object.
+ // Else, string-ify and compare against event.originalPolicy.
+ function promise_violation(filter_arg) {
+ return _ => new Promise((resolve, reject) => {
+ function handler(e) {
+ let matches = (filter_arg instanceof Function)
+ ? filter_arg(e)
+ : (e.originalPolicy.includes(filter_arg));
+ if (matches) {
+ document.removeEventListener("securitypolicyviolation", handler);
+ e.stopPropagation();
+ resolve(e);
+ }
+ }
+ document.addEventListener("securitypolicyviolation", handler);
+ });
+ }
+
+ // Like assert_throws, but we don't care about the exact error. We just want
+ // to run the code and continue.
+ function expect_throws(fn) {
+ try { fn(); assert_unreached(); } catch (err) { /* ignore */ }
+ }
+
+ // A sample policy we use to test TrustedTypes.createPolicy behaviour.
+ const id = x => x;
+ const a_policy = {
+ createHTML: id,
+ createScriptURL: id,
+ createURL: id,
+ createScript: id,
+ };
+
+ const scriptyPolicy = TrustedTypes.createPolicy('allowEval', a_policy);
+
+ // Provoke/wait for a CSP violation, in order to be sure that all previous
+ // CSP violations have been delivered.
+ function promise_flush() {
+ return promise_violation("plugin-types bla/blubb");
+ }
+ function flush() {
+ expect_throws(_ => {
+ var o = document.createElement('object');
+ o.type = "application/x-shockwave-flash";
+ document.body.appendChild(o);
+ });
+ }
+
+ window.script_run_beacon = 'never_overwritten';
+
+ promise_test(t => {
+ let p = Promise.resolve()
+ .then(promise_violation("trusted-types *"))
+ .then(promise_flush());
+ expect_throws(_ => eval('script_run_beacon="should not run"'));
+ assert_equals(script_run_beacon, 'never_overwritten');
+ flush();
+ return p;
+ }, "Trusted Type violation report: evaluating a string.");
+
+ promise_test(t => {
+ let p = promise_flush()();
+ eval(scriptyPolicy.createScript('script_run_beacon="i ran"'));
+ flush();
+ assert_equals(script_run_beacon, 'i ran');
+ return p;
+ }, "Trusted Type violation report: evaluating a Trusted Script.");
+
+ promise_test(t => {
+ TrustedTypes.createPolicy('default', {
+ createScript: s => s.replace('payload', 'default policy'),
+ }, true);
+ let p = promise_flush()();
+ eval('script_run_beacon="payload"');
+ assert_equals(script_run_beacon, 'default policy');
+ flush();
+ return p;
+ }, "Trusted Type violation report: default policy transforms the script before CSP checks runs.");
+
+ </script>
+</body>
diff --git a/tests/wpt/web-platform-tests/trusted-types/trusted-types-eval-reporting.tentative.https.html.headers b/tests/wpt/web-platform-tests/trusted-types/trusted-types-eval-reporting.tentative.https.html.headers
new file mode 100644
index 00000000000..2e935f73a48
--- /dev/null
+++ b/tests/wpt/web-platform-tests/trusted-types/trusted-types-eval-reporting.tentative.https.html.headers
@@ -0,0 +1,4 @@
+Content-Security-Policy: trusted-types *
+Content-Security-Policy: script-src http: https: 'nonce-123' 'unsafe-eval'
+Content-Security-Policy: plugin-types bla/blubb
+
diff --git a/tests/wpt/web-platform-tests/webxr/xrSession_viewer_availability.https.html b/tests/wpt/web-platform-tests/webxr/xrSession_viewer_availability.https.html
index 686859166fe..c509e5f1a2a 100644
--- a/tests/wpt/web-platform-tests/webxr/xrSession_viewer_availability.https.html
+++ b/tests/wpt/web-platform-tests/webxr/xrSession_viewer_availability.https.html
@@ -8,7 +8,7 @@
<script>
let testName =
- "Inline viewer support wtih no device";
+ "Inline viewer support with no device";
// Purposefully not connecting a device to ensure that viewer is always
// supported if that is the only feature requested.
@@ -16,33 +16,65 @@
(t) => {
function session_resolves(sessionMode, sessionInit) {
return navigator.xr.requestSession(sessionMode, sessionInit)
- .then((session) => {
- return session.end();
+ .then(session => session.end());
+ }
+
+ function session_rejects(expected, sessionMode, sessionInit) {
+ return promise_rejects(t, expected, navigator.xr.requestSession(sessionMode, sessionInit)
+ .then(session => session.end()));
+ }
+
+ function simulate_user_activation(func) {
+ return new Promise((resolve, reject) => {
+ navigator.xr.test.simulateUserActivation(() => {
+ try { resolve(func()); } catch(e) { reject(e); }
});
+ });
}
- // RequestSession with explicit request for the viewer space should succeed.
return session_resolves('inline', {
+ // RequestSession with 'viewer' as a required featre should succeed, even
+ // without user activation.
requiredFeatures: ['viewer']
})
.then(() => {
+ // RequestSession with 'viewer' as an optional feature should succeed, even
+ // without user activation.
+ return session_resolves('inline', {
+ optionalFeatures: ['viewer']
+ })
+ })
+ .then(() => {
// RequestSession with no requirements should succeed.
return session_resolves('inline', {});
})
.then(() => {
+ // RequestSession with non-viewer optional features should fail
+ // without user activation.
+ return session_rejects("SecurityError", 'inline', {
+ optionalFeatures: ['local']
+ });
+ })
+ .then(() => {
+ // RequestSession with non-viewer required features should fail
+ // without user activation.
+ return session_rejects("SecurityError", 'inline', {
+ optionalFeatures: ['local']
+ });
+ })
+ .then(() => simulate_user_activation(() => {
// RequestSession with unsupported optional features should succeed.
return session_resolves('inline', {
requiredFeatures: ['viewer'],
optionalFeatures: ['local']
})
- })
- .then(() => {
+ }))
+ .then(() => simulate_user_activation(() => {
// Request with unsupported required features should reject.
- return promise_rejects(t, "NotSupportedError",
- navigator.xr.requestSession('inline', {
+ return session_rejects("NotSupportedError", 'inline', {
requiredFeatures: ['local']
- }));
- });
+ });
+ }));
});
</script>